A. Schaad, A Framework for Evidence Lifecycle Management, Web Information Systems Engineering, Proceedings of the WISE 2007 International Workshops, pp.191-200, 2007.
DOI : 10.1007/978-3-540-77010-7_19

C. K. Patrick, K. Hung, and . Karlapalem, A secure workflow model, ACSW Frontiers '03: Proceedings of the Australasian information security workshop conference on ACSW frontiers, pp.33-41, 2003.

V. Atluri, W. Huang, and E. Bertino, An execution model for multilevel seccure workflows, Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI, pp.151-165, 1998.

N. Russell, M. P. Wil, A. H. Van-der-aalst, D. Ter-hofstede, and . Edmond, Workflow Resource Patterns: Identification, Representation and Tool Support, Proceedings of the Advanced Information Systems Engineering, 17th International Conference, pp.216-232, 2005.
DOI : 10.1007/11431855_16

E. Barka and R. Sandhu, Framework for role-based delegation models, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00), pp.168-176, 2000.
DOI : 10.1109/ACSAC.2000.898870

K. Gaaloul, F. Charoy, A. Schaad, and H. Lee, Collaboration for Human-Centric eGovernment Workflows, Web Information Systems Engineering, Proceedings of the WISE 2007 International Workshops, pp.201-212, 2007.
DOI : 10.1007/978-3-540-77010-7_20

URL : https://hal.archives-ouvertes.fr/inria-00182290

M. S. Olivier, R. P. Van-de-riet, and E. Gudes, Specifying application-level security in workflow systems, Proceedings Ninth International Workshop on Database and Expert Systems Applications (Cat. No.98EX130), pp.346-351, 1998.
DOI : 10.1109/DEXA.1998.707423

M. Kohler and A. Schaad, Avoiding Policy-based Deadlocks in Business Processes, 2008 Third International Conference on Availability, Reliability and Security, pp.709-716, 2008.
DOI : 10.1109/ARES.2008.131

L. Zhang, G. Ahn, and B. Chu, A rule-based framework for role-based delegation and revocation, ACM Transactions on Information and System Security, vol.6, issue.3, pp.404-441, 2003.
DOI : 10.1145/937527.937530

W. David, A. Chadwick, and . Otenko, The PERMIS X.509 role based privilege management infrastructure. SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies, pp.135-140, 2002.

A. Belokosztolszki, D. M. Eyers, and K. Moody, Policy contexts: controlling information flow in parameterised RBAC, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, p.99, 2003.
DOI : 10.1109/POLICY.2003.1206964

X. Zhang, S. Oh, and R. Sandhu, PBDM, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, pp.149-157, 2003.
DOI : 10.1145/775412.775431

J. Crampton and H. Khambhammettu, Delegation in rolebased access control, Proceedings of the Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, pp.174-191, 2006.