Computer Science ›› 2015, Vol. 42 ›› Issue (7): 99-102.doi: 10.11896/j.issn.1002-137X.2015.07.021
Previous Articles Next Articles
SHANG Chao-wang, LIU Qing-tang and WANG Yan-feng
[1] 林日昶,赵文耘,等.支持风险偏好的Web服务动态组合方法[J].中国科学:信息科学,2014,4(1):130-141 Lin Ri-chang,Zhao Wen-yun,et al.Dynamic Web service composition approach supporting different risk appetites[J].Scientia Sinica Information,2014,4(1):130-141 [2] 余波.应用Petri网改进BPEL程序的正确性[J].计算机应用研究,2011,8(9):3348-3352 Yu Bo.Improving correctness of BPEL program with petri net[J].Application Research of Computers,2011,28(9):3348-3352 [3] Kristof G.Adaptive workflow composition in service -based systems[D].Leuven:Katholieke university,2013 Yu Bo.Improving Correctness of BEPL Program with Petri net[J].Application Research of Computers,2011,8(9):3348-3352 [4] Roman K.Provision of service level agreements in human-enhanced service-oriented computing environments[D].Vienna:Vienna University of Technology,2012 [5] Henrique J A,Jose J M.Performance evaluation of web services orchestrated with WS-BPEL4 People[J].International Journal of Computer Networks & Communications,2010,2(6):117-134 [6] Huy T,Uwe Z,et al.Compliance in service-oriented architectures:a model-driven and view-based approach[J].Information and Software Technology,2013,4(5):531-552 [7] Waldemar H,Patrick G,et al.An integrated approach for identity and access management in a soa context[C]∥The ACM Symposium on Access Control Models and Technologies.2011:21-30 [8] Anupa B,Prasanna N B.Intelligent compliance certification[J].International Journal of Advanced Computer and Mathematical Sciences,2012,3(4):394-404 [9] Emmanouela S,Anakreon M,et al.Rigorous analysis of service composability by embedding WS-BPEL into the BIP component framework[C]∥Proc of 19th International Conference on Web Services.2012:319-326 [10] Karsten T.A Unified framework for security visualization and enforcement in business process driven environments[D].Stuttgart:University of Stuttgart,2011 [11] Leitner M,Rinderle M,et al.AW-RBAC:access control in adaptive workflow systems[C]∥Proc of 6th International Confe-rence on Availability.Reliability and Security,2011:27-34 [12] Jakob G.Team execution of multi-user workflows -modeling,dependability and optimization[D].Munich:Technique University of Munich,2009 [13] Wang Xin.A framework to manage message level authorization in service oriented collaborative business processes[D].Melbourne:Victoria University,2013 [14] Thomas R K,Sandahu R.Task-based authentication controls(TABC):a family of models for active and enterprise-oriented authentication management[C]∥Proc of IFIP Workshop on Database Security.1997:165-172 [15] Han R F,et al.A united access control model for systems collaborative commerce[J].Journal of Networks,2009,4(4):279-290 [16] Yu Ding-guo.Role and task-based access control model for Web service integration[J].Journal of Computational Information Systems,2012,8(7):2681-2689 [17] Rajender N,Gulshan A.An authorization mechanism for access control of resources in the web services paradigm[J].International Journal of Advanced Computer Science and Applications,2011,2(6):36-43 [18] Mark S,Jan M.Modeling process-related RBAC models with ex-tended UML activity models[J].Information and Software Technology,2011,53(2):456-483 [19] Ganna M,Brucker A D,et al.Security and safety of assets in business processes[C]∥Proc of the 27th Symposium on Applied Computing.2013:1667-1673 [20] Doglas R,Estrella J C,et al.Analysis of security and perfor-mance aspects in service-oriented architectures[J].International Journal of Security and Its Applications,2011,5(1):13-30 [21] 魏永合.工作流环境下访问控制技术研究[D].沈阳:东北大学,2009 We Yong-he.Research on Technology of Access Control under Workflow[D].Shenyang:Northeastern University,2009 [22] Samuel J B.Modeling and enforcing workflow authorizations[D].Zurich:Eth Zurich,2012 [23] David B,Samuel J B,et al.Separation of duties as a service[C]∥Proc of the 6th ACM Symposium on Information,Computer and Communications Security.2013:423-429 [24] Bernhand H,Stefan S,et al.Modeling and enforcing secure object flows in process-driven SOAs:an integrated model-driven approach[J].Software and Systems Modeling,2012,5(2):1-36 [25] Frederica P,Bertino E.An access-control framework for WS-BPEL [J].International Journal of Web Services Research,2008,5(3):20-43 [26] 上超望,刘清堂,等.使用控制支持的组合Web服务业务流程动态访问控制模型研究[J].武汉大学学报(理学版),2011,7(5):408-412 Shang Chao-wang,Liu Qing-tang,et al.A Research on UCON Enhanced Dynamic Access Control Model for the Business Process of Composite Web Services[J].Journal of Wuhan University(Natural Science Edition),2011,7(5):408-412 [27] Rafael A.An approach to data-driven detective internal controls for process-aware information Systems[C]∥Workshop on Data Usage Management on the Web 2012.2012:20-25 [28] Bertino E,Martino D L,et al.Security for Web services and ser-vice-oriented architectures[M].Berlin:Springer,2010:170-175 [29] Ahmed A.A compliance management framework for BusinessProcess models[D].Potsdam:University Of Potsdam,2010 [30] Mohsen R.Security analysis for web services compositions [J].International Journal of Scientific & Engineering Research,2012, 3(5):1-8 [31] Alberto C,Silvio R,et al.Automated validation of security-sensitive Web Services specified in BPEL and RBAC[C]∥Proc of the 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing.2010:456-464 [32] Maria L,Juergen M,et al.SPRINT-responsibilities:design and development of security policies in process-aware information systems[J].Journal of Wireless Mobile Networks,Ubiquitous Computing,and Dependable Applications,2011,2(4):4-26 [33] Manuel M,Nicola D.Implementing workflow reconfiguration in WS-BPEL[J].Journal of Internet Services and Information Security,2013,2(2):73-92 [34] 许蕾,徐宝文,等.一种面向用户需求的Web服务测试方法[J].计算机学报,2014,7(3):512-522 Xu Lei,Xu Bao-wen, et al.A Testing Method for Web Services Focusing on User Requirement[J].Chinese Journal of Computers,2014,7(3):512-522 [35] Michel E J,Marc F,et al.Enforcing ASTD access-control policies with WS-BPEL processes in soa environments[J].International Journal of Systems and Service-Oriented Engineering,2011,2(2):37-59 [36] Ziyi S.Applying digital rights management to corporate information systems[D].Lyon:National Institute of Applied Sciences,2012 [37] Hristo K.A Survey on distributed access control systems for Web business processes[J].International Journal of Network Security,2009,9(1):61-69 [38] Fernando L,Julio D,et al.Towards automation of soa-basedBusiness Process[J].International Journal of Computer Science,Engineering and Applications,2012,2(2):1-17 [39] Alfonso R,Eduardo F,et al.Secure business process model speci-fication through a UML 2.0 activity diagram profile[J].Decision Support Systems,2011,1(6):446-465 [40] Zahra D,Behrouz T L.A model for specification,compositionand verification of access control policies and its application to Web services[J].Journal of Information Security,2013,3(2):103-120 |
No related articles found! |
|