{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T04:49:05Z","timestamp":1725684545358},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642303586"},{"type":"electronic","value":"9783642303593"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30359-3_6","type":"book-chapter","created":{"date-parts":[[2012,5,16]],"date-time":"2012-05-16T00:20:47Z","timestamp":1337127647000},"page":"60-71","source":"Crossref","is-referenced-by-count":2,"title":["An Approach for Consistent Delegation in Process-Aware Information Systems"],"prefix":"10.1007","author":[{"given":"Sigrid","family":"Schefer-Wenzl","sequence":"first","affiliation":[]},{"given":"Mark","family":"Strembeck","sequence":"additional","affiliation":[]},{"given":"Anne","family":"Baumgrass","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Atluri, V., Warner, J.: Supporting Conditional Delegation in Secure Workflow Management Systems. In: Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, SACMAT (June 2005)","DOI":"10.1145\/1063979.1063990"},{"key":"6_CR2","unstructured":"Barka, E., Sandhu, R.: Framework for Role-Based Delegation Models. In: Proceedings of the 16th Annual Computer Security Applications Conference, ACSAC (December 2000)"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44569-2_1","volume-title":"Policies for Distributed Systems and Networks","author":"J. Cole","year":"2001","unstructured":"Cole, J., Derrick, J., Milosevic, Z., Raymond, K.: Author Obliged to Submit Paper before 4 July: Policies in an Enterprise Specification. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol.\u00a01995, pp. 1\u201317. Springer, Heidelberg (2001)"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Crampton, J., Khambhammettu, H.: Delegation and Satisfiability in Workflow Systems. In: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, SACMAT (June 2008)","DOI":"10.1145\/1377836.1377842"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Crampton, J., Khambhammettu, H.: Delegation in Role-Based Access Control. International Journal of Information Security\u00a07(2) (2008)","DOI":"10.1007\/s10207-007-0044-8"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Crampton, J., Khambhammettu, H.: On Delegation and Workflow Execution Models. In: Proceedings of the 2008 ACM Symposium on Applied Computing, SAC (March 2008)","DOI":"10.1145\/1363686.1364199"},{"key":"6_CR7","unstructured":"Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-Based Access Control, 2nd edn. Artech House (2007)"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Joshi, J.B.D., Bertino, E.: Fine-grained Role-based Delegation in Presence of the Hybrid Role Hierarchy. In: Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, SACMAT (June 2006)","DOI":"10.1145\/1133058.1133071"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-Based Access Control Models. IEEE Computer\u00a029(2) (1996)","DOI":"10.1109\/2.485845"},{"key":"6_CR10","unstructured":"Schaad, A.: Detecting Conflicts in a Role-Based Delegation Model. In: Proceedings of the 17th Annual Computer Security Applications Conference, ACSAC (2001)"},{"key":"6_CR11","unstructured":"Schaad, A., Moffett, J.D.: Delegation of Obligations. In: Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks, POLICY (June 2002)"},{"key":"6_CR12","unstructured":"Schefer, S., Strembeck, M.: Modeling Process-Related Duties with Extended UML Activity and Interaction Diagrams. Electronic Communications of the EASST\u00a037 (March 2011)"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-642-25109-2_22","volume-title":"On the Move to Meaningful Internet Systems: OTM 2011","author":"S. Schefer","year":"2011","unstructured":"Schefer, S., Strembeck, M., Mendling, J., Baumgrass, A.: Detecting and Resolving Conflicts of Mutual-Exclusion and Binding Constraints in a Business Process Context. In: Meersman, R., Dillon, T., Herrero, P., Kumar, A., Reichert, M., Qing, L., Ooi, B.-C., Damiani, E., Schmidt, D.C., White, J., Hauswirth, M., Hitzler, P., Mohania, M. (eds.) OTM 2011, Part I. LNCS, vol.\u00a07044, pp. 329\u2013346. Springer, Heidelberg (2011)"},{"key":"6_CR14","unstructured":"Shang, Q., Wang, X.: Constraints for Permission-Based Delegations. In: Proceedings of the 8th IEEE International Conference on Computer and Information Technology Workshops, CITWORKSHOPS (2008)"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Strembeck, M.: Scenario-Driven Role Engineering. IEEE Security & Privacy\u00a08(1) (2010)","DOI":"10.1109\/MSP.2010.46"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/978-3-642-16934-2_16","volume-title":"On the Move to Meaningful Internet Systems, OTM 2010","author":"M. Strembeck","year":"2010","unstructured":"Strembeck, M., Mendling, J.: Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context. In: Meersman, R., Dillon, T.S., Herrero, P. (eds.) OTM 2010, Part I. LNCS, vol.\u00a06426, pp. 204\u2013221. Springer, Heidelberg (2010)"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Strembeck, M., Mendling, J.: Modeling Process-related RBAC Models with Extended UML Activity Models. Information and Software Technology\u00a053(5) (2011)","DOI":"10.1016\/j.infsof.2010.11.015"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Wainer, J., Kumar, A., Barthelmess, P.: DW-RBAC: A formal security model of delegation and revocation in workflow systems. Information Systems\u00a032(3) (2007)","DOI":"10.1016\/j.is.2005.11.008"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Warner, J., Atluri, V.: Inter-Instance Authorization Constraints for Secure Workflow Management. In: Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, SACMAT (June 2006)","DOI":"10.1145\/1133058.1133085"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, X., Oh, S., Sandhu, R.: PBDM: A Flexible Delegation Model in RBAC. Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, SACMAT (June 2003)","DOI":"10.1145\/775412.775431"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Zhao, G., Chadwick, D., Otenko, S.: Obligations for Role Based Access Control. In: Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops, AINAW (May 2007)","DOI":"10.1109\/AINAW.2007.267"}],"container-title":["Lecture Notes in Business Information Processing","Business Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30359-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T19:23:23Z","timestamp":1558380203000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30359-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642303586","9783642303593"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30359-3_6","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2012]]}}}