Delegation Security Analysis in Workflow Systems.
Benyuan YangHesuan HuPublished in: IEEE Trans. Dependable Secur. Comput. (2024)
Keyphrases
- workflow systems
- security analysis
- access control
- security requirements
- access control policies
- security policies
- fine grained
- security mechanisms
- business processes
- user authentication
- smart card
- temporal constraints
- public key
- workflow management
- conflict resolution
- active databases
- databases
- process model
- mobile agents
- relational databases
- information systems
- database