References
- Mike Anderson, "Workflow Interoperability-Enabling E-Commerce", WfMC White Paper, 1999.
- Elisa Bertin, Elena Ferrari, "The Specification and Enforcement of Authorization Constraints in Workflow Management Systems," ACM Transactions on Information Systems and System Security, Vol. 2, No. 1, 1999, pp. 65-104. https://doi.org/10.1145/300830.300837
- Mary Ann Davidson, "Security for E-Business," Information Security Technical Report, Vol. 6, No. 2, 2001, pp. 80-94. https://doi.org/10.1016/S1363-4127(01)00209-6
- Ehud Gudes, Martin S. Oliver and Reind P. van de jet, "Modeling, Specifying and Implementing Workflow Security in Cyberspace," Journal of Computer Security, Vol. 7, No. 4, 1999.
- T.Leighton, S.Micali, "Secret-Key Agreement without Public-Key Cryptography," Proceedings of Crypto 94, 1994, pp.456-479.
- Le Yang, M.G.Choi, Y.S.Choi, S.M. Shin, "FWAM: A Flexible Workflow Authorization Model using Extended RBAC," Proceeding of Computer Supported Cooperative Work in Design, 2008.
- D. Liu, M. Wu and S. Lee, "Role-Based Authorizations for Workflow Systems in Support of Task-Based Separation of Duty," The Journal of Systems and Software, Vol. 73, 2004, pp. 375-387. https://doi.org/10.1016/S0164-1212(03)00175-4
- Myeonggil Choi, Urlong Jin, Y.S.Choi, and S.M. Shin, "Development of a Flexible Access Conrol Design by Extending RBAC," Proceedings of First International Conference on Communications and Networking in China, 2006.
- Patrick McDaniel, Peter Honeyman, "Antigone: Flexible Framework for Secure Group Communication", Proceedings of the 8th USENIX Security Symposium, 1999, pp. 99-114.
- S. Tinderle, M. Teichert and P. Dadam, “Correctness Criteria for Dynamic Changes in Workflow Systems,” Data & Knowledge Engineering, Vol. 50, 2004, pp. 9-34. https://doi.org/10.1016/j.datak.2004.01.002
- Workflow Management Coalition, "Workflow Reference Model", Technical Report, 1994.
- Workflow Management Coalition, "Workflow and Internet: Catalysts for Radical Change," White Paper, June, 1998.
- Workflow Management Coalition, "Workflow Security Considerations," White Paper, 1998.