2023
DOI: 10.1109/tii.2023.3240568
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Assignment of Roles and Users for Business Processes Under Security Requirements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 35 publications
0
4
0
Order By: Relevance
“…01: assign t [1]=p [1]&s; 02: assign t [2]=p [5]&e [1]; 03: assign t[3]=p [2]&p [3]&p [4]; 04: assign t [4]=p [6]&e [2]; 05: assign t [5]=p [7]&x [1]&~x [2]&~x [3]; 06: assign t [6]=p [7]&~x [1]&~x [2]&x [3]; 07: assign t [7]=p [7]&~x [1]&x [2]&~x [3]; 08: assign t [8]=p [8]&~x [3]; 09: assign t [9]=p [9]&~x [2]; 10: assign t [10]=p [10]&x [1];…”
Section: Transformation Of the Petri Net-based Description Into Veril...mentioning
confidence: 99%
See 2 more Smart Citations
“…01: assign t [1]=p [1]&s; 02: assign t [2]=p [5]&e [1]; 03: assign t[3]=p [2]&p [3]&p [4]; 04: assign t [4]=p [6]&e [2]; 05: assign t [5]=p [7]&x [1]&~x [2]&~x [3]; 06: assign t [6]=p [7]&~x [1]&~x [2]&x [3]; 07: assign t [7]=p [7]&~x [1]&x [2]&~x [3]; 08: assign t [8]=p [8]&~x [3]; 09: assign t [9]=p [9]&~x [2]; 10: assign t [10]=p [10]&x [1];…”
Section: Transformation Of the Petri Net-based Description Into Veril...mentioning
confidence: 99%
“…However, in the presented photovoltaic system, other equations are going to be optimized. //Equations of transitions: 03: assign t[1]=p [1]; 04: assign t [2]=p [10]&p [11]&p [12]&p [13]&p [14]&p [15]&p [16] Listing 6 presents sample equations for the outputs. The particular values (status_e, status_p, and status_t) are computed based on the current status of sensors.…”
Section: Transformation Of the Petri Net-based Description Into Veril...mentioning
confidence: 99%
See 1 more Smart Citation
“…As the authors of [6] explain, this can have an extremely damaging impact on business, potentially causing loss of data and intellectual property, interference in business operations, and reputational harm. In the future society, security must influence business processes, for example, in the assignment of roles and responsibilities, as this could significantly reduce the occurrence of cybersecurity attacks [7]. The security of 5G has become a critical requirement since business dynamics have expanded to actors belonging to disparate fields, thus implying that the set of players who could breach network security is very diversified [8].…”
Section: Introductionmentioning
confidence: 99%