2017
DOI: 10.1016/j.eswa.2017.05.078
|View full text |Cite
|
Sign up to set email alerts
|

The specification and design of secure context-aware workflows

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…one of the process's instances is executed in a platform and another instance is executed in a different platform). For this reason, a recent work proposes a language for the specification and design of context-aware and secure workflow systems [59]. The approaches to enforce security policies at runtime mainly focus on integrating security control mechanisms into business process management systems [9].…”
Section: Related Workmentioning
confidence: 99%
“…one of the process's instances is executed in a platform and another instance is executed in a different platform). For this reason, a recent work proposes a language for the specification and design of context-aware and secure workflow systems [59]. The approaches to enforce security policies at runtime mainly focus on integrating security control mechanisms into business process management systems [9].…”
Section: Related Workmentioning
confidence: 99%
“…Aich et al [20] proposed the spatiotemporal RBAC (STARBAC) that takes into consideration time and location constraints in addition to the traditional RBAC. Zedan and Al-Sultan proposed in [21] a policy-based approach that defines policies as compositional rules where policies are analyzed and verified at run time. Md Emanual Kabir and Hua Wang [22] proposed a conditional based access control model that enables access to data based on the conditional intended purpose.…”
Section: Related Workmentioning
confidence: 99%
“…As an example, Sultan et. al (Zedan & Al-Sultan, 2017) applied some features such as term weight, length ratio, lexical, and semantic similarities with supervised learning algorithm. Their experiments, which were performed on SemEval-2013 (Agirre et al, 2013) and Mohler (Mohler et al, 2011) datasets concluded that the augmentation of key gradingspecific construct (i.e question demoting) to text similarity features are proved to be effective by producing top results on multiple benchmarks.…”
Section: Related Workmentioning
confidence: 99%