共 50 条
- [1] Injecting formulized delegation constraints into secure workflow systems PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, 2008, : 370 - +
- [2] Delegation and Satisfiability in Workflow Systems SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 31 - 40
- [3] Secure Internet management by delegation COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2001, 35 (01): : 39 - 56
- [6] Controlled Delegation of Signature in Workflow Systems 2012 20TH TELECOMMUNICATIONS FORUM (TELFOR), 2012, : 1389 - 1392
- [7] Injecting a Permission-based Delegation Model to Secure Web-based Workflow Systems ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 101 - 106
- [8] Supporting Effective Unexpected Exceptions Handling in Workflow Management Systems APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 1242 - +
- [9] Supporting secure and transparent delegation in the CORBA proxy platform π2 EMERGING PERSONAL WIRELESS COMMUNICATIONS, 2001, 67 : 271 - 283
- [10] Secure management by delegation within the Internet Management Framework INTEGRATED NETWORK MANAGEMENT VI: DISTRIBUTED MANAGEMENT FOR THE NETWORKED MILLENNIUM, 1999, : 687 - 700