{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T00:28:34Z","timestamp":1649118514225},"reference-count":72,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2014,8,1]],"date-time":"2014-08-01T00:00:00Z","timestamp":1406851200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wirtschaftsinf"],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1007\/s11576-014-0433-3","type":"journal-article","created":{"date-parts":[[2014,8,22]],"date-time":"2014-08-22T02:40:59Z","timestamp":1408675259000},"page":"237-260","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Modellierungsunterst\u00fctzung f\u00fcr die rollenbasierte Delegation in prozessgest\u00fctzten Informationssystemen"],"prefix":"10.1007","volume":"56","author":[{"given":"Sigrid","family":"Schefer-Wenzl","sequence":"first","affiliation":[]},{"given":"Mark","family":"Strembeck","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,23]]},"reference":[{"key":"433_CR1","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/1063979.1063990","volume-title":"Proceedings of the 10th ACM symposium on access control models and technologies (SACMAT)","author":"V Atluri","year":"2005","unstructured":"Atluri V, Warner J (2005) Supporting conditional delegation in secure workflow management systems. In: Proceedings of the 10th ACM symposium on access control models and technologies (SACMAT), S\u00a049\u201358"},{"key":"433_CR2","unstructured":"BAL (2012) Business activity library and runtime engine. http:\/\/wi.wu.ac.at\/home\/mark\/BusinessActivities\/library.html . Abruf am 2012-09-24"},{"key":"433_CR3","volume-title":"Proceedings of the 23rd national information systems security conference (NISSEC)","author":"E Barka","year":"2000","unstructured":"Barka E, Sandhu R (2000a) A role-based delegation model and some extensions. In: Proceedings of the 23rd national information systems security conference (NISSEC)"},{"key":"433_CR4","volume-title":"Proceedings of the 16th annual computer security applications conference (ACSAC)","author":"E Barka","year":"2000","unstructured":"Barka E, Sandhu R (2000b) Framework for role-based delegation models. In: Proceedings of the 16th annual computer security applications conference (ACSAC)"},{"issue":"1","key":"433_CR5","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/1125808.1125810","volume":"15","author":"D Basin","year":"2006","unstructured":"Basin D, Doser J, Lodderstedt T (2006) Model driven security: from UML models to access control Infrastructure. ACM Transactions on Software Engineering and Methodolocy 15(1):39\u201391","journal-title":"ACM Transactions on Software Engineering and Methodolocy"},{"issue":"3","key":"433_CR6","doi-asserted-by":"crossref","first-page":"666","DOI":"10.1147\/sj.403.0666","volume":"40","author":"RA Botha","year":"2001","unstructured":"Botha RA, Eloff JH (2001) Separation of duties for access control enforcement in workflow environments. IBM Systems Journal 40(3):666\u2013682","journal-title":"IBM Systems Journal"},{"issue":"3","key":"433_CR7","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1023\/A:1011461409620","volume":"3","author":"F Casati","year":"2001","unstructured":"Casati F, Castano S, Fugini M (2001) Managing workflow authorization constraints through active database technology. Information Systems Frontiers 3(3):319\u2013338","journal-title":"Information Systems Frontiers"},{"key":"433_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-44569-2_1","volume-title":"Proceedings of the International workshop on policies for distributed systems and networks (POLICY)","author":"J Cole","year":"2001","unstructured":"Cole J, Derrick J, Milosevic Z, Raymond K (2001) Author obliged to submit paper before 4 July: policies in an enterprise specification. In: Proceedings of the International workshop on policies for distributed systems and networks (POLICY), S\u00a01\u201317"},{"key":"433_CR9","doi-asserted-by":"crossref","DOI":"10.4135\/9781452230153","volume-title":"Basics of qualitative research: techniques and procedures for developing grounded theory","author":"J Corbin","year":"2008","unstructured":"Corbin J, Strauss A (2008) Basics of qualitative research: techniques and procedures for developing grounded theory. Sage, Thousand Oaks"},{"key":"433_CR10","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/1377836.1377842","volume-title":"Proceedings of the 13th ACM symposium on access control models and technologies (SACMAT)","author":"J Crampton","year":"2008","unstructured":"Crampton J, Khambhammettu H (2008a) Delegation and satisfiability in workflow systems. In: Proceedings of the 13th ACM symposium on access control models and technologies (SACMAT), S\u00a031\u201340"},{"issue":"2","key":"433_CR11","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/s10207-007-0044-8","volume":"7","author":"J Crampton","year":"2008","unstructured":"Crampton J, Khambhammettu H (2008b) Delegation in role-based access control. International Journal of Information Security 7(2):123\u2013136","journal-title":"International Journal of Information Security"},{"key":"433_CR12","volume-title":"Proceedings of the 2008 ACM symposium on applied computing (SAC)","author":"J Crampton","year":"2008","unstructured":"Crampton J, Khambhammettu H (2008c) On delegation and workflow execution models. In: Proceedings of the 2008 ACM symposium on applied computing (SAC)"},{"key":"433_CR13","volume-title":"Proceedings of the 24th International conference on advanced information systems engineering (CAiSE)","author":"M Dumas","year":"2012","unstructured":"Dumas M, Rosa ML, Mendling J, Maesaku R, Hajo AR, Semenenko N (2012) Understanding business process models: the costs and benefits of structuredness. In: Proceedings of the 24th International conference on advanced information systems engineering (CAiSE)"},{"key":"433_CR14","doi-asserted-by":"crossref","unstructured":"Ferraiolo D, Barkley J, Kuhn D (1999) A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information and System Security (TISSEC) 2(1)","DOI":"10.1145\/300830.300834"},{"key":"433_CR15","volume-title":"Role-based access control","author":"DF Ferraiolo","year":"2007","unstructured":"Ferraiolo DF, Kuhn DR, Chandramouli R (2007) Role-based access control, 2. Aufl. Artech House, Norwood","edition":"2"},{"key":"433_CR16","volume-title":"Proceedings of the 9th IFIP conference on e-business, e-services, and e-society (I3E)","author":"K Gaaloul","year":"2009","unstructured":"Gaaloul K, Charoy F (2009) Task delegation based access control models for workflow systems. In: Proceedings of the 9th IFIP conference on e-business, e-services, and e-society (I3E)"},{"key":"433_CR17","volume-title":"Proceedings of the 22nd International conference on advanced information systems engineering (CAiSE)","author":"K Gaaloul","year":"2010","unstructured":"Gaaloul K, Zahoor E, Charoy F Godart C (2010) Dynamic authorisation policies for event-based task delegation. In: Proceedings of the 22nd International conference on advanced information systems engineering (CAiSE)"},{"key":"433_CR18","volume-title":"Proceedings of the workshops on business informatics research","author":"K Gaaloul","year":"2011","unstructured":"Gaaloul K, Proper E, Charoy F (2011) An extended RBAC model for task delegation in workflow systems. In: Proceedings of the workshops on business informatics research"},{"key":"433_CR19","first-page":"21","volume-title":"Proceedings of the 6th ACM symposium on access control models and technologies (SACMAT)","author":"CK Georgiadis","year":"2001","unstructured":"Georgiadis CK, Mavridis I, Pangalos G, Thomas RK (2001) Flexible team-based access control using contexts. In: Proceedings of the 6th ACM symposium on access control models and technologies (SACMAT), S\u00a021\u201327"},{"key":"433_CR20","volume-title":"Proceedings of the International conference on management of emergent digital ecosystems (MEDES)","author":"MB Ghorbel-Talbi","year":"2010","unstructured":"Ghorbel-Talbi MB, Cuppens F, Cuppens-Boulahia N (2010) Negotiating and delegating obligations. In: Proceedings of the International conference on management of emergent digital ecosystems (MEDES)"},{"key":"433_CR21","volume-title":"Proceedings of the International information security and privacy conference (SEC)","author":"MB Ghorbel-Talbi","year":"2011","unstructured":"Ghorbel-Talbi MB, Cuppens F, Cuppens-Boulahia N, Metayer DL, Piolle G (2011) Delegation of obligations and responsibility. In: Proceedings of the International information security and privacy conference (SEC)"},{"key":"433_CR22","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1145\/1809842.1809861","volume-title":"Proceedings of the 15th ACM symposium on access control models and technologies (SACMAT)","author":"K Hasebe","year":"2010","unstructured":"Hasebe K, Mabuchi M, Matsushita A (2010) Capability-based delegation model in RBAC. In: Proceedings of the 15th ACM symposium on access control models and technologies (SACMAT), S\u00a0109\u2013118"},{"key":"433_CR23","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/s10270-012-0263-y","volume":"2","author":"B Hoisl","year":"2014","unstructured":"Hoisl B, Sobernig S, Strembeck M (2014) Modeling and enforcing secure object flows in process-driven SOAs: an integrated model-driven approach. Software and Systems Modeling 2:513\u2013548","journal-title":"Software and Systems Modeling"},{"key":"433_CR24","volume-title":"Proceedings of the 11th IEEE International software metrics symposium (METRICS)","author":"SE Hove","year":"2005","unstructured":"Hove SE, Anda B (2005) Experiences from conducting semi-structured interviews in empirical software engineering research. In: Proceedings of the 11th IEEE International software metrics symposium (METRICS)"},{"key":"433_CR25","first-page":"81","volume-title":"Proceedings of the 11th ACM symposium on access control models and technologies (SACMAT)","author":"JBD Joshi","year":"2006","unstructured":"Joshi JBD, Bertino E (2006) Fine-grained role-based delegation in presence of the hybrid role hierarchy. In: Proceedings of the 11th ACM symposium on access control models and technologies (SACMAT), S\u00a081\u201390"},{"key":"433_CR26","volume-title":"Proceedings of the 27th International conference on software engineering (ICSE)","author":"J J\u00fcrjens","year":"2005","unstructured":"J\u00fcrjens J (2005) Sound methods and effective tools for model-based security engineering with UML. In: Proceedings of the 27th International conference on software engineering (ICSE)"},{"issue":"8","key":"433_CR27","doi-asserted-by":"crossref","first-page":"813","DOI":"10.1002\/int.20432","volume":"25","author":"H Mouratidis","year":"2010","unstructured":"Mouratidis H, J\u00fcrjens J (2010) From goal-driven security requirements engineering to secure design. International Journal of Intelligent Systems 25(8):813\u2013840","journal-title":"International Journal of Intelligent Systems"},{"key":"433_CR28","volume-title":"Proceedings of the sixteenth annual Tcl\/Tk conference","author":"G Neumann","year":"2009","unstructured":"Neumann G, Sobernig S (2009) XOTcl 2.0 \u2013 a ten-year retrospective and outlook. In: Proceedings of the sixteenth annual Tcl\/Tk conference"},{"key":"433_CR29","volume-title":"Proceedings of the the 18th annual Tcl\/Tk conference","author":"G Neumann","year":"2011","unstructured":"Neumann G, Sobernig S (2011) An overview of the next scripting toolkit. In: Proceedings of the the 18th annual Tcl\/Tk conference"},{"key":"433_CR30","volume-title":"Proceedings of Tcl2k: the 7th USENIX Tcl\/Tk conference","author":"G Neumann","year":"2000","unstructured":"Neumann G, Zdun U (2000) XOTcl, an object-oriented scripting language. In: Proceedings of Tcl2k: the 7th USENIX Tcl\/Tk conference"},{"issue":"6","key":"433_CR31","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1016\/S0306-4379(02)00029-7","volume":"28","author":"S Oh","year":"2003","unstructured":"Oh S, Park S (2003) Task-role-based access control model. Information Systems 28(6):533\u2013562","journal-title":"Information Systems"},{"key":"433_CR32","unstructured":"OMG (2011a) Meta object facility (MOF) core specification. Version 2.4.1, formal\/2011-08-07. The Object Management Group. http:\/\/www.omg.org\/spec\/MOF . Abruf am 2012-02-27"},{"key":"433_CR33","unstructured":"OMG (2011b) Unified modeling language (OMG UML): superstructure. Version 2.4.1, formal\/2011-08-06. The Object Management Group. http:\/\/www.omg.org\/spec\/UML"},{"key":"433_CR34","unstructured":"OMG (2014) Object constraint language specification. Version 2.4, formal\/2014-02-03. The Object Management Group. http:\/\/www.omg.org\/spec\/OCL . Abruf am 2014-04-25"},{"key":"433_CR35","volume-title":"Proceedings of the winter USENIX conference","author":"J Ousterhout","year":"1990","unstructured":"Ousterhout J (1990) Tcl: an embeddable command language. In: Proceedings of the winter USENIX conference"},{"key":"433_CR36","first-page":"71","volume-title":"Proceedings of the 11th ACM symposium on access control models and technologies (SACMAT)","author":"A Ravichandran","year":"2006","unstructured":"Ravichandran A, Yoon J (2006) Trust management with delegation in grouped peer-to-peer communities. In: Proceedings of the 11th ACM symposium on access control models and technologies (SACMAT), S\u00a071\u201380"},{"key":"433_CR37","volume-title":"14th European conference on information systems","author":"J Recker","year":"2006","unstructured":"Recker J, Indulska M, Rosemann M, Green P (2006) How good is BPMN really? Insights from theory and practice. In: 14th European conference on information systems"},{"key":"433_CR38","volume-title":"Proceedings of the international workshop on security in information systems (WOSIS)","author":"A Rodriguez","year":"2007","unstructured":"Rodriguez A, de Guzman IGR (2007) Obtaining use case and security use cases from secure business process through the MDA approach. In: Proceedings of the international workshop on security in information systems (WOSIS)"},{"key":"433_CR39","volume-title":"Proceedings of the international conference on trust and privacy in digital business (TrustBus)","author":"A Rodriguez","year":"2006","unstructured":"Rodriguez A, Fernandez-Medina E, Piattini M (2006) Towards a UML 2.0 extension for the modeling of security requirements in business processes. In: Proceedings of the international conference on trust and privacy in digital business (TrustBus)"},{"issue":"2","key":"433_CR40","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/s10664-008-9102-8","volume":"14","author":"P Runeson","year":"2009","unstructured":"Runeson P, H\u00f6st M (2009) Guidelines for conducting and reporting case study research in software engineering. Empirical Software Engineering 14(2):131\u2013164","journal-title":"Empirical Software Engineering"},{"key":"433_CR41","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/11431855_16","volume-title":"Proceedings of the 17th conference on advanced information systems engineering (CAiSE\u201905)","author":"N Russell","year":"2005","unstructured":"Russell N, Hofstede AHMT, Edmond D (2005) Workflow resource patterns: identification, representation and tool support. In: Proceedings of the 17th conference on advanced information systems engineering (CAiSE\u201905). Lecture notes in computer science, Bd\u00a03520. Springer, Heidelberg, S\u00a0216\u2013232"},{"issue":"2","key":"433_CR42","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R Sandhu","year":"1996","unstructured":"Sandhu R, Coyne E, Feinstein H, Youman C (1996) Role-based access control models. IEEE Computer 29(2):38\u201347","journal-title":"IEEE Computer"},{"key":"433_CR43","first-page":"117","volume-title":"Proceedings of the 17th annual computer security applications conference (ACSAC)","author":"A Schaad","year":"2001","unstructured":"Schaad A (2001) Detecting conflicts in a role-based delegation model. In: Proceedings of the 17th annual computer security applications conference (ACSAC), S\u00a0117\u2013126"},{"key":"433_CR44","volume-title":"Proceedings of the 3rd International workshop on policies for distributed systems and networks (POLICY)","author":"A Schaad","year":"2002","unstructured":"Schaad A, Moffett JD (2002) Delegation of obligations. In: Proceedings of the 3rd International workshop on policies for distributed systems and networks (POLICY)"},{"key":"433_CR45","unstructured":"Schefer S, Strembeck M (2011a) Modeling process-related duties with extended UML activity and interaction diagrams. Electronic Communications of the EASST 37"},{"key":"433_CR46","series-title":"Lecture notes in business information processing","volume-title":"International workshop on information systems security engineering (WISSE)","author":"S Schefer","year":"2011","unstructured":"Schefer S, Strembeck M (2011b) Modeling support for delegating roles, tasks, and duties in a process-related RBAC context. In: International workshop on information systems security engineering (WISSE). Lecture notes in business information processing. Springer, Heidelberg"},{"key":"433_CR47","series-title":"Lecture notes in computer science","volume-title":"Proceedings of the 19th International conference on cooperative information systems (CoopIS)","author":"S Schefer","year":"2011","unstructured":"Schefer S, Strembeck M, Mendling J, Baumgrass A (2011) Detecting and resolving conflicts of mutual-exclusion and binding constraints in a business process context. In: Proceedings of the 19th International conference on cooperative information systems (CoopIS). Lecture notes in computer science, Bd\u00a07044. Springer, Heidelberg"},{"key":"433_CR48","series-title":"Lecture notes in business information processing","volume-title":"Proceedings of the 15th international conference on business information systems (BIS)","author":"S Schefer-Wenzl","year":"2012","unstructured":"Schefer-Wenzl S, Strembeck M, Baumgrass A (2012) An approach for consistent delegation in process-aware information systems. In: Proceedings of the 15th international conference on business information systems (BIS). Lecture notes in business information processing, Bd\u00a0117. Springer, Heidelberg"},{"key":"433_CR49","volume-title":"Proceedings of the 21st European conference on information systems (ECIS), Utrecht","author":"S Schefer-Wenzl","year":"2013","unstructured":"Schefer-Wenzl S, Sobernig S, Strembeck M (2013) Evaluating a UML-based modeling framework for process-related security properties: a qualitative multi-method study. In: Proceedings of the 21st European conference on information systems (ECIS), Utrecht"},{"issue":"2","key":"433_CR50","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/MC.2006.58","volume":"39","author":"DC Schmidt","year":"2006","unstructured":"Schmidt DC (2006) Model-driven engineering \u2013 guest editor\u2019s introduction. IEEE Computer 39(2):25\u201331","journal-title":"IEEE Computer"},{"issue":"5","key":"433_CR51","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/MS.2003.1231146","volume":"20","author":"B Selic","year":"2003","unstructured":"Selic B (2003) The pragmatics of model-driven development. IEEE Software 20(5):19\u201325","journal-title":"IEEE Software"},{"key":"433_CR52","first-page":"216","volume-title":"Proceedings of the 8th IEEE International conference on computer and information technology workshops (CITWORKSHOPS)","author":"Q Shang","year":"2008","unstructured":"Shang Q, Wang X (2008) Constraints for permission-based delegations. In: Proceedings of the 8th IEEE International conference on computer and information technology workshops (CITWORKSHOPS), S\u00a0216\u2013223"},{"issue":"12","key":"433_CR53","doi-asserted-by":"crossref","first-page":"1396","DOI":"10.1016\/j.infsof.2012.06.008","volume":"54","author":"K Sohr","year":"2012","unstructured":"Sohr K, Kuhlmann M, Gogolla M, Hu H, Ahn GJ (2012) Comprehensive two-level analysis of role-based delegation and revocation policies with UML and OCL. Information and Software Technology 54(12):1396\u20131417","journal-title":"Information and Software Technology"},{"key":"433_CR54","volume-title":"Model-driven software development","author":"T Stahl","year":"2006","unstructured":"Stahl T, V\u00f6lter M (2006) Model-driven software development. Wiley, New York"},{"key":"433_CR55","volume-title":"Proceedings of the 6th IEEE International workshop on policies for distributed systems and networks (POLICY)","author":"M Strembeck","year":"2005","unstructured":"Strembeck M (2005) Embedding policy rules for software-based systems in a requirements context. In: Proceedings of the 6th IEEE International workshop on policies for distributed systems and networks (POLICY)"},{"issue":"1","key":"433_CR56","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MSP.2010.46","volume":"8","author":"M Strembeck","year":"2010","unstructured":"Strembeck M (2010) Scenario-driven role engineering. IEEE Security & Privacy 8(1):28\u201335","journal-title":"IEEE Security & Privacy"},{"key":"433_CR57","series-title":"Lecture notes in computer science","volume-title":"Proceedings of the 18th International conference on cooperative information systems (CoopIS)","author":"M Strembeck","year":"2010","unstructured":"Strembeck M, Mendling J (2010) Generic algorithms for consistency checking of mutual-exclusion and binding constraints in a business process context. In: Proceedings of the 18th International conference on cooperative information systems (CoopIS). Lecture notes in computer science, Bd\u00a06426. Springer, Heidelberg"},{"issue":"5","key":"433_CR58","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1016\/j.infsof.2010.11.015","volume":"53","author":"M Strembeck","year":"2011","unstructured":"Strembeck M, Mendling J (2011) Modeling process-related RBAC models with extended uml activity models. Information and Software Technology 53(5):456\u2013483","journal-title":"Information and Software Technology"},{"key":"433_CR59","volume-title":"Proceedings of the 17th IEEE workshop on computer security foundations","author":"K Tan","year":"2004","unstructured":"Tan K, Crampton J, Gunter CA (2004) The consistency of task-based authorization constraints in workflow systems. In: Proceedings of the 17th IEEE workshop on computer security foundations"},{"key":"433_CR60","first-page":"166","volume-title":"Proceedings of the IFIP TC11 WG11.3 11th International conference on database security XI: status and prospects","author":"RK Thomas","year":"1997","unstructured":"Thomas RK, Sandhu RS (1997) Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented autorization management. In: Proceedings of the IFIP TC11 WG11.3 11th International conference on database security XI: status and prospects, S\u00a0166\u2013181"},{"key":"433_CR61","unstructured":"Vondal F (2012) Modellierung von Delegation in prozessbezogenen RBAC-Modellen \u2013 Eine Fallstudie. Bachelor thesis, WU Vienna"},{"issue":"4","key":"433_CR62","doi-asserted-by":"crossref","DOI":"10.1142\/S0218843003000814","volume":"12","author":"J Wainer","year":"2003","unstructured":"Wainer J, Barthelmess P, Kumar A (2003) W-RBAC \u2013 a workflow security model incorporating controlled overriding of constraints. International Journal of Cooperative Information Systems 12(4):455","journal-title":"International Journal of Cooperative Information Systems"},{"issue":"3","key":"433_CR63","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1016\/j.is.2005.11.008","volume":"32","author":"J Wainer","year":"2007","unstructured":"Wainer J, Kumar A, Barthelmess P (2007) DW-RBAC: a formal security model of delegation and revocation in workflow systems. Information Systems 32(3):365\u2013384","journal-title":"Information Systems"},{"key":"433_CR64","first-page":"190","volume-title":"Proceedings of the 11th ACM symposium on access control models and technologies (SACMAT)","author":"J Warner","year":"2006","unstructured":"Warner J, Atluri V (2006) Inter-instance authorization constraints for secure workflow management. In: Proceedings of the 11th ACM symposium on access control models and technologies (SACMAT), S\u00a0190\u2013199"},{"key":"433_CR65","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-28616-2","volume-title":"Business process management: concepts, languages, architectures","author":"M Weske","year":"2012","unstructured":"Weske M (2012) Business process management: concepts, languages, architectures, 2. Aufl. Springer, Heidelberg","edition":"2"},{"key":"433_CR66","volume-title":"Proceedings of the IASTED International conference on software engineering","author":"C Wolter","year":"2008","unstructured":"Wolter C, Schaad A, Meinel C (2008) A transformation approach for security enhanced business processes. In: Proceedings of the IASTED International conference on software engineering"},{"issue":"4","key":"433_CR67","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/j.sysarc.2008.10.002","volume":"55","author":"C Wolter","year":"2009","unstructured":"Wolter C, Menzel M, Schaad A, Miseldine P, Meinel C (2009) Model-driven business process security requirement specification. Journal of Systems Architecture 55(4):211\u2013223","journal-title":"Journal of Systems Architecture"},{"issue":"8","key":"433_CR68","doi-asserted-by":"crossref","first-page":"871","DOI":"10.1016\/j.infsof.2006.10.001","volume":"49","author":"U Zdun","year":"2007","unstructured":"Zdun U, Strembeck M, Neumann G (2007) Object-based and class-based composition of transitive mixins. Information and Software Technology 49(8):871\u2013891","journal-title":"Information and Software Technology"},{"issue":"3","key":"433_CR69","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1145\/937527.937530","volume":"6","author":"L Zhang","year":"2003","unstructured":"Zhang L, Ahn GJ, Chu BT (2003a) A rule-based framework for role-based delegation and revocation. ACM Transations on Information System Security 6(3):404\u2013441","journal-title":"ACM Transations on Information System Security"},{"key":"433_CR70","first-page":"149","volume-title":"Proceedings of the 8th ACM symposium on access control models and technologies (SACMAT)","author":"X Zhang","year":"2003","unstructured":"Zhang X, Oh S, Sandhu R (2003b) PBDM: a flexible delegation model in RBAC. In: Proceedings of the 8th ACM symposium on access control models and technologies (SACMAT), S\u00a0149\u2013157"},{"key":"433_CR71","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1109\/AINAW.2007.267","volume-title":"Proceedings of the 21st International conference on advanced information networking and applications workshops (AINAW)","author":"G Zhao","year":"2007","unstructured":"Zhao G, Chadwick D, Otenko S (2007) Obligations for role based access control. In: Proceedings of the 21st International conference on advanced information networking and applications workshops (AINAW), S\u00a0424\u2013431"},{"issue":"4","key":"433_CR72","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1016\/j.is.2009.02.006","volume":"35","author":"M zur Muehlen","year":"2010","unstructured":"zur Muehlen M, Indulska M (2010) Modeling languages for business processes and business rules: a representational analysis. Information Systems 35(4):379\u2013390","journal-title":"Information Systems"}],"container-title":["WIRTSCHAFTSINFORMATIK"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11576-014-0433-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11576-014-0433-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11576-014-0433-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T01:46:03Z","timestamp":1565747163000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11576-014-0433-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":72,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,8]]}},"alternative-id":["433"],"URL":"https:\/\/doi.org\/10.1007\/s11576-014-0433-3","relation":{},"ISSN":["0937-6429","1861-8936"],"issn-type":[{"value":"0937-6429","type":"print"},{"value":"1861-8936","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8]]}}}