Implementing the Chinese Wall Security Model in Workflow Management Systems.
Yu-Cheng HsiaoGwan-Hwan HwangPublished in: ISPA (2010)
Keyphrases
- security model
- workflow management systems
- business processes
- access control
- public key
- security requirements
- security analysis
- workflow management
- business process
- provably secure
- workflow systems
- process model
- workflow processes
- virtual enterprise
- encryption scheme
- mobile agents
- intelligent systems
- workflow execution
- real world