Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Dynamic Authorisation Policies for Event-Based Task Delegation

Identifieur interne : 003714 ( Istex/Corpus ); précédent : 003713; suivant : 003715

Dynamic Authorisation Policies for Event-Based Task Delegation

Auteurs : Khaled Gaaloul ; Ehtesham Zahoor ; François Charoy ; Claude Godart

Source :

RBID : ISTEX:E55CF792E842AC2AA2D562CC6BA71C6A6C234741

Abstract

Abstract: Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are two important issues relating to delegation, namely allowing task delegation to complete, and having a secure delegation within a workflow. Delegation completion and authorisation enforcement are specified under specific constraints. Constraints are defined from the delegation context implying the presence of a fixed set of delegation events to control the delegation execution. In this paper, we aim to reason about delegation events to specify delegation policies dynamically. To that end, we present an event-based task delegation model to monitor the delegation process. We then identify relevant events for authorisation enforcement to specify delegation policies. Moreover, we propose a technique that automates delegation policies using event calculus to control the delegation execution and increase the compliance of all delegation changes in the global policy.

Url:
DOI: 10.1007/978-3-642-13094-6_12

Links to Exploration step

ISTEX:E55CF792E842AC2AA2D562CC6BA71C6A6C234741

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Dynamic Authorisation Policies for Event-Based Task Delegation</title>
<author>
<name sortKey="Gaaloul, Khaled" sort="Gaaloul, Khaled" uniqKey="Gaaloul K" first="Khaled" last="Gaaloul">Khaled Gaaloul</name>
<affiliation>
<mods:affiliation>LORIA - Nancy University - UMR 7503, BP 239, F-54506, Vandœuvre-lès-Nancy Cedex, France</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: kgaaloul@loria.fr</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Zahoor, Ehtesham" sort="Zahoor, Ehtesham" uniqKey="Zahoor E" first="Ehtesham" last="Zahoor">Ehtesham Zahoor</name>
<affiliation>
<mods:affiliation>LORIA - Nancy University - UMR 7503, BP 239, F-54506, Vandœuvre-lès-Nancy Cedex, France</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: zahoor@loria.fr</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Charoy, Francois" sort="Charoy, Francois" uniqKey="Charoy F" first="François" last="Charoy">François Charoy</name>
<affiliation>
<mods:affiliation>LORIA - Nancy University - UMR 7503, BP 239, F-54506, Vandœuvre-lès-Nancy Cedex, France</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: charoy@loria.fr</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Godart, Claude" sort="Godart, Claude" uniqKey="Godart C" first="Claude" last="Godart">Claude Godart</name>
<affiliation>
<mods:affiliation>LORIA - Nancy University - UMR 7503, BP 239, F-54506, Vandœuvre-lès-Nancy Cedex, France</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: godart@loria.fr</mods:affiliation>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:E55CF792E842AC2AA2D562CC6BA71C6A6C234741</idno>
<date when="2010" year="2010">2010</date>
<idno type="doi">10.1007/978-3-642-13094-6_12</idno>
<idno type="url">https://api.istex.fr/ark:/67375/HCB-BDM27RCX-X/fulltext.pdf</idno>
<idno type="wicri:Area/Istex/Corpus">003714</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">003714</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Dynamic Authorisation Policies for Event-Based Task Delegation</title>
<author>
<name sortKey="Gaaloul, Khaled" sort="Gaaloul, Khaled" uniqKey="Gaaloul K" first="Khaled" last="Gaaloul">Khaled Gaaloul</name>
<affiliation>
<mods:affiliation>LORIA - Nancy University - UMR 7503, BP 239, F-54506, Vandœuvre-lès-Nancy Cedex, France</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: kgaaloul@loria.fr</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Zahoor, Ehtesham" sort="Zahoor, Ehtesham" uniqKey="Zahoor E" first="Ehtesham" last="Zahoor">Ehtesham Zahoor</name>
<affiliation>
<mods:affiliation>LORIA - Nancy University - UMR 7503, BP 239, F-54506, Vandœuvre-lès-Nancy Cedex, France</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: zahoor@loria.fr</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Charoy, Francois" sort="Charoy, Francois" uniqKey="Charoy F" first="François" last="Charoy">François Charoy</name>
<affiliation>
<mods:affiliation>LORIA - Nancy University - UMR 7503, BP 239, F-54506, Vandœuvre-lès-Nancy Cedex, France</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: charoy@loria.fr</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Godart, Claude" sort="Godart, Claude" uniqKey="Godart C" first="Claude" last="Godart">Claude Godart</name>
<affiliation>
<mods:affiliation>LORIA - Nancy University - UMR 7503, BP 239, F-54506, Vandœuvre-lès-Nancy Cedex, France</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: godart@loria.fr</mods:affiliation>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s" type="main" xml:lang="en">Lecture Notes in Computer Science</title>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are two important issues relating to delegation, namely allowing task delegation to complete, and having a secure delegation within a workflow. Delegation completion and authorisation enforcement are specified under specific constraints. Constraints are defined from the delegation context implying the presence of a fixed set of delegation events to control the delegation execution. In this paper, we aim to reason about delegation events to specify delegation policies dynamically. To that end, we present an event-based task delegation model to monitor the delegation process. We then identify relevant events for authorisation enforcement to specify delegation policies. Moreover, we propose a technique that automates delegation policies using event calculus to control the delegation execution and increase the compliance of all delegation changes in the global policy.</div>
</front>
</TEI>
<istex>
<corpusName>springer-ebooks</corpusName>
<author>
<json:item>
<name>Khaled Gaaloul</name>
<affiliations>
<json:string>LORIA - Nancy University - UMR 7503, BP 239, F-54506, Vandœuvre-lès-Nancy Cedex, France</json:string>
<json:string>E-mail: kgaaloul@loria.fr</json:string>
</affiliations>
</json:item>
<json:item>
<name>Ehtesham Zahoor</name>
<affiliations>
<json:string>LORIA - Nancy University - UMR 7503, BP 239, F-54506, Vandœuvre-lès-Nancy Cedex, France</json:string>
<json:string>E-mail: zahoor@loria.fr</json:string>
</affiliations>
</json:item>
<json:item>
<name>François Charoy</name>
<affiliations>
<json:string>LORIA - Nancy University - UMR 7503, BP 239, F-54506, Vandœuvre-lès-Nancy Cedex, France</json:string>
<json:string>E-mail: charoy@loria.fr</json:string>
</affiliations>
</json:item>
<json:item>
<name>Claude Godart</name>
<affiliations>
<json:string>LORIA - Nancy University - UMR 7503, BP 239, F-54506, Vandœuvre-lès-Nancy Cedex, France</json:string>
<json:string>E-mail: godart@loria.fr</json:string>
</affiliations>
</json:item>
</author>
<subject>
<json:item>
<lang>
<json:string>eng</json:string>
</lang>
<value>Workflow</value>
</json:item>
<json:item>
<lang>
<json:string>eng</json:string>
</lang>
<value>task</value>
</json:item>
<json:item>
<lang>
<json:string>eng</json:string>
</lang>
<value>delegation</value>
</json:item>
<json:item>
<lang>
<json:string>eng</json:string>
</lang>
<value>policy</value>
</json:item>
<json:item>
<lang>
<json:string>eng</json:string>
</lang>
<value>event calculus</value>
</json:item>
</subject>
<arkIstex>ark:/67375/HCB-BDM27RCX-X</arkIstex>
<language>
<json:string>eng</json:string>
</language>
<originalGenre>
<json:string>OriginalPaper</json:string>
</originalGenre>
<abstract>Abstract: Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are two important issues relating to delegation, namely allowing task delegation to complete, and having a secure delegation within a workflow. Delegation completion and authorisation enforcement are specified under specific constraints. Constraints are defined from the delegation context implying the presence of a fixed set of delegation events to control the delegation execution. In this paper, we aim to reason about delegation events to specify delegation policies dynamically. To that end, we present an event-based task delegation model to monitor the delegation process. We then identify relevant events for authorisation enforcement to specify delegation policies. Moreover, we propose a technique that automates delegation policies using event calculus to control the delegation execution and increase the compliance of all delegation changes in the global policy.</abstract>
<qualityIndicators>
<score>8.812</score>
<pdfWordCount>5695</pdfWordCount>
<pdfCharCount>35268</pdfCharCount>
<pdfVersion>1.6</pdfVersion>
<pdfPageCount>15</pdfPageCount>
<pdfPageSize>430 x 660 pts</pdfPageSize>
<refBibsNative>false</refBibsNative>
<abstractWordCount>151</abstractWordCount>
<abstractCharCount>1060</abstractCharCount>
<keywordCount>5</keywordCount>
</qualityIndicators>
<title>Dynamic Authorisation Policies for Event-Based Task Delegation</title>
<chapterId>
<json:string>12</json:string>
<json:string>Chap12</json:string>
</chapterId>
<genre>
<json:string>conference</json:string>
</genre>
<serie>
<title>Lecture Notes in Computer Science</title>
<language>
<json:string>unknown</json:string>
</language>
<copyrightDate>2010</copyrightDate>
<issn>
<json:string>0302-9743</json:string>
</issn>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<editor>
<json:item>
<name>David Hutchison</name>
<affiliations>
<json:string>Lancaster University, Lancaster, UK</json:string>
</affiliations>
</json:item>
<json:item>
<name>Takeo Kanade</name>
<affiliations>
<json:string>Carnegie Mellon University, Pittsburgh, PA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Josef Kittler</name>
<affiliations>
<json:string>University of Surrey, Guildford, UK</json:string>
</affiliations>
</json:item>
<json:item>
<name>Jon M. Kleinberg</name>
<affiliations>
<json:string>Cornell University, Ithaca, NY, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Friedemann Mattern</name>
<affiliations>
<json:string>ETH Zurich, Zurich, Switzerland</json:string>
</affiliations>
</json:item>
<json:item>
<name>John C. Mitchell</name>
<affiliations>
<json:string>Stanford University, Stanford, CA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Moni Naor</name>
<affiliations>
<json:string>Weizmann Institute of Science, Rehovot, Israel</json:string>
</affiliations>
</json:item>
<json:item>
<name>Oscar Nierstrasz</name>
<affiliations>
<json:string>University of Bern, Bern, Switzerland</json:string>
</affiliations>
</json:item>
<json:item>
<name>C. Pandu Rangan</name>
<affiliations>
<json:string>Indian Institute of Technology, Madras, India</json:string>
</affiliations>
</json:item>
<json:item>
<name>Bernhard Steffen</name>
<affiliations>
<json:string>University of Dortmund, Dortmund, Germany</json:string>
</affiliations>
</json:item>
<json:item>
<name>Madhu Sudan</name>
<affiliations>
<json:string>Massachusetts Institute of Technology, MA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Demetri Terzopoulos</name>
<affiliations>
<json:string>University of California, Los Angeles, CA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Doug Tygar</name>
<affiliations>
<json:string>University of California, Berkeley, CA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Moshe Y. Vardi</name>
<affiliations>
<json:string>Rice University, Houston, TX, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Gerhard Weikum</name>
<affiliations>
<json:string>Max-Planck Institute of Computer Science, Saarbrücken, Germany</json:string>
</affiliations>
</json:item>
</editor>
</serie>
<host>
<title>Advanced Information Systems Engineering</title>
<language>
<json:string>unknown</json:string>
</language>
<copyrightDate>2010</copyrightDate>
<doi>
<json:string>10.1007/978-3-642-13094-6</json:string>
</doi>
<issn>
<json:string>0302-9743</json:string>
</issn>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<eisbn>
<json:string>978-3-642-13094-6</json:string>
</eisbn>
<bookId>
<json:string>978-3-642-13094-6</json:string>
</bookId>
<isbn>
<json:string>978-3-642-13093-9</json:string>
</isbn>
<volume>6051</volume>
<pages>
<first>135</first>
<last>149</last>
</pages>
<genre>
<json:string>book-series</json:string>
</genre>
<editor>
<json:item>
<name>Barbara Pernici</name>
<affiliations>
<json:string>Dipartimento di Elettronica e Informazione, Politecnico di Milano,, Piazza Leonardo da Vinci 32, 20133, Milano, Italy</json:string>
<json:string>E-mail: barbara.pernici@polimi.it</json:string>
</affiliations>
</json:item>
</editor>
<subject>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Information Systems Applications (incl.Internet)</value>
</json:item>
<json:item>
<value>Information Storage and Retrieval</value>
</json:item>
<json:item>
<value>Computer Communication Networks</value>
</json:item>
<json:item>
<value>Software Engineering</value>
</json:item>
<json:item>
<value>Database Management</value>
</json:item>
<json:item>
<value>Artificial Intelligence (incl. Robotics)</value>
</json:item>
</subject>
</host>
<ark>
<json:string>ark:/67375/HCB-BDM27RCX-X</json:string>
</ark>
<publicationDate>2010</publicationDate>
<copyrightDate>2010</copyrightDate>
<doi>
<json:string>10.1007/978-3-642-13094-6_12</json:string>
</doi>
<id>E55CF792E842AC2AA2D562CC6BA71C6A6C234741</id>
<score>1</score>
<fulltext>
<json:item>
<extension>pdf</extension>
<original>true</original>
<mimetype>application/pdf</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-BDM27RCX-X/fulltext.pdf</uri>
</json:item>
<json:item>
<extension>zip</extension>
<original>false</original>
<mimetype>application/zip</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-BDM27RCX-X/bundle.zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/ark:/67375/HCB-BDM27RCX-X/fulltext.tei">
<teiHeader>
<fileDesc>
<titleStmt>
<title level="a" type="main" xml:lang="en">Dynamic Authorisation Policies for Event-Based Task Delegation</title>
</titleStmt>
<publicationStmt>
<authority>ISTEX</authority>
<availability>
<licence>Springer-Verlag Berlin Heidelberg</licence>
</availability>
<date when="2010">2010</date>
</publicationStmt>
<notesStmt>
<note type="conference" source="proceedings" scheme="https://content-type.data.istex.fr/ark:/67375/XTP-BFHXPBJJ-3">conference</note>
<note type="publication-type" subtype="book-series" scheme="https://publication-type.data.istex.fr/ark:/67375/JMC-0G6R5W5T-Z">book-series</note>
</notesStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Dynamic Authorisation Policies for Event-Based Task Delegation</title>
<author>
<persName>
<forename type="first">Khaled</forename>
<surname>Gaaloul</surname>
</persName>
<email>kgaaloul@loria.fr</email>
<affiliation>
<orgName type="institution">LORIA - Nancy University - UMR 7503, BP 239</orgName>
<address>
<postCode>F-54506</postCode>
<settlement>Vandœuvre-lès-Nancy Cedex</settlement>
<country key="FR">FRANCE</country>
</address>
</affiliation>
</author>
<author>
<persName>
<forename type="first">Ehtesham</forename>
<surname>Zahoor</surname>
</persName>
<email>zahoor@loria.fr</email>
<affiliation>
<orgName type="institution">LORIA - Nancy University - UMR 7503, BP 239</orgName>
<address>
<postCode>F-54506</postCode>
<settlement>Vandœuvre-lès-Nancy Cedex</settlement>
<country key="FR">FRANCE</country>
</address>
</affiliation>
</author>
<author>
<persName>
<forename type="first">François</forename>
<surname>Charoy</surname>
</persName>
<email>charoy@loria.fr</email>
<affiliation>
<orgName type="institution">LORIA - Nancy University - UMR 7503, BP 239</orgName>
<address>
<postCode>F-54506</postCode>
<settlement>Vandœuvre-lès-Nancy Cedex</settlement>
<country key="FR">FRANCE</country>
</address>
</affiliation>
</author>
<author>
<persName>
<forename type="first">Claude</forename>
<surname>Godart</surname>
</persName>
<email>godart@loria.fr</email>
<affiliation>
<orgName type="institution">LORIA - Nancy University - UMR 7503, BP 239</orgName>
<address>
<postCode>F-54506</postCode>
<settlement>Vandœuvre-lès-Nancy Cedex</settlement>
<country key="FR">FRANCE</country>
</address>
</affiliation>
</author>
<idno type="istex">E55CF792E842AC2AA2D562CC6BA71C6A6C234741</idno>
<idno type="ark">ark:/67375/HCB-BDM27RCX-X</idno>
<idno type="DOI">10.1007/978-3-642-13094-6_12</idno>
</analytic>
<monogr>
<title level="m" type="main">Advanced Information Systems Engineering</title>
<title level="m" type="sub">22nd International Conference, CAiSE 2010, Hammamet, Tunisia, June 7-9, 2010. Proceedings</title>
<title level="m" type="part">Session 4: Security and Management</title>
<idno type="DOI">10.1007/978-3-642-13094-6</idno>
<idno type="book-id">978-3-642-13094-6</idno>
<idno type="ISBN">978-3-642-13093-9</idno>
<idno type="eISBN">978-3-642-13094-6</idno>
<idno type="chapter-id">Chap12</idno>
<idno type="part-id">Part5</idno>
<editor>
<persName>
<forename type="first">Barbara</forename>
<surname>Pernici</surname>
</persName>
<email>barbara.pernici@polimi.it</email>
<affiliation>
<orgName type="department">Dipartimento di Elettronica e Informazione</orgName>
<orgName type="institution">Politecnico di Milano,</orgName>
<address>
<street>Piazza Leonardo da Vinci 32</street>
<postCode>20133</postCode>
<settlement>Milano</settlement>
<country key="IT">ITALY</country>
</address>
</affiliation>
</editor>
<imprint>
<biblScope unit="vol">6051</biblScope>
<biblScope unit="page" from="135">135</biblScope>
<biblScope unit="page" to="149">149</biblScope>
<biblScope unit="chapter-count">41</biblScope>
<biblScope unit="part-chapter-count">3</biblScope>
</imprint>
</monogr>
<series>
<title level="s" type="main" xml:lang="en">Lecture Notes in Computer Science</title>
<editor>
<persName>
<forename type="first">David</forename>
<surname>Hutchison</surname>
</persName>
<affiliation>
<orgName type="institution">Lancaster University</orgName>
<address>
<settlement>Lancaster</settlement>
<country key="GB">UNITED KINGDOM</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Takeo</forename>
<surname>Kanade</surname>
</persName>
<affiliation>
<orgName type="institution">Carnegie Mellon University</orgName>
<address>
<settlement>Pittsburgh</settlement>
<region>PA</region>
<country key="US">UNITED STATES</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Josef</forename>
<surname>Kittler</surname>
</persName>
<affiliation>
<orgName type="institution">University of Surrey</orgName>
<address>
<settlement>Guildford</settlement>
<country key="GB">UNITED KINGDOM</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Jon</forename>
<forename type="first">M.</forename>
<surname>Kleinberg</surname>
</persName>
<affiliation>
<orgName type="institution">Cornell University</orgName>
<address>
<settlement>Ithaca</settlement>
<region>NY</region>
<country key="US">UNITED STATES</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Friedemann</forename>
<surname>Mattern</surname>
</persName>
<affiliation>
<orgName type="institution">ETH Zurich</orgName>
<address>
<settlement>Zurich</settlement>
<country key="CH">SWITZERLAND</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">John</forename>
<forename type="first">C.</forename>
<surname>Mitchell</surname>
</persName>
<affiliation>
<orgName type="institution">Stanford University</orgName>
<address>
<settlement>Stanford</settlement>
<region>CA</region>
<country key="US">UNITED STATES</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Moni</forename>
<surname>Naor</surname>
</persName>
<affiliation>
<orgName type="institution">Weizmann Institute of Science</orgName>
<address>
<settlement>Rehovot</settlement>
<country key="IL">ISRAEL</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Oscar</forename>
<surname>Nierstrasz</surname>
</persName>
<affiliation>
<orgName type="institution">University of Bern</orgName>
<address>
<settlement>Bern</settlement>
<country key="CH">SWITZERLAND</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">C.</forename>
<surname>Pandu Rangan</surname>
</persName>
<affiliation>
<orgName type="institution">Indian Institute of Technology</orgName>
<address>
<settlement>Madras</settlement>
<country key="IN">INDIA</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Bernhard</forename>
<surname>Steffen</surname>
</persName>
<affiliation>
<orgName type="institution">University of Dortmund</orgName>
<address>
<settlement>Dortmund</settlement>
<country key="DE">GERMANY</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Madhu</forename>
<surname>Sudan</surname>
</persName>
<affiliation>
<orgName type="institution">Massachusetts Institute of Technology</orgName>
<address>
<region>MA</region>
<country key="US">UNITED STATES</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Demetri</forename>
<surname>Terzopoulos</surname>
</persName>
<affiliation>
<orgName type="institution">University of California</orgName>
<address>
<settlement>Los Angeles</settlement>
<region>CA</region>
<country key="US">UNITED STATES</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Doug</forename>
<surname>Tygar</surname>
</persName>
<affiliation>
<orgName type="institution">University of California</orgName>
<address>
<settlement>Berkeley</settlement>
<region>CA</region>
<country key="US">UNITED STATES</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Moshe</forename>
<forename type="first">Y.</forename>
<surname>Vardi</surname>
</persName>
<affiliation>
<orgName type="institution">Rice University</orgName>
<address>
<settlement>Houston</settlement>
<region>TX</region>
<country key="US">UNITED STATES</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Gerhard</forename>
<surname>Weikum</surname>
</persName>
<affiliation>
<orgName type="institution">Max-Planck Institute of Computer Science</orgName>
<address>
<settlement>Saarbrücken</settlement>
<country key="DE">GERMANY</country>
</address>
</affiliation>
</editor>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="seriesID">558</idno>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<abstract xml:lang="en">
<head>Abstract</head>
<p>Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are two important issues relating to delegation, namely allowing task delegation to complete, and having a secure delegation within a workflow. Delegation completion and authorisation enforcement are specified under specific constraints. Constraints are defined from the delegation context implying the presence of a fixed set of delegation events to control the delegation execution.</p>
<p>In this paper, we aim to reason about delegation events to specify delegation policies dynamically. To that end, we present an event-based task delegation model to monitor the delegation process. We then identify relevant events for authorisation enforcement to specify delegation policies. Moreover, we propose a technique that automates delegation policies using event calculus to control the delegation execution and increase the compliance of all delegation changes in the global policy.</p>
</abstract>
<textClass ana="keyword">
<keywords xml:lang="en">
<term>Workflow</term>
<term>task</term>
<term>delegation</term>
<term>policy</term>
<term>event calculus</term>
</keywords>
</textClass>
<textClass ana="subject">
<keywords scheme="book-subject-collection">
<list>
<label>SUCO11645</label>
<item>
<term>Computer Science</term>
</item>
</list>
</keywords>
</textClass>
<textClass ana="subject">
<keywords scheme="book-subject">
<list>
<label>I</label>
<item>
<term type="Primary">Computer Science</term>
</item>
<label>I18040</label>
<item>
<term type="Secondary" subtype="priority-1">Information Systems Applications (incl.Internet)</term>
</item>
<label>I18032</label>
<item>
<term type="Secondary" subtype="priority-2">Information Storage and Retrieval</term>
</item>
<label>I13022</label>
<item>
<term type="Secondary" subtype="priority-3">Computer Communication Networks</term>
</item>
<label>I14029</label>
<item>
<term type="Secondary" subtype="priority-4">Software Engineering</term>
</item>
<label>I18024</label>
<item>
<term type="Secondary" subtype="priority-5">Database Management</term>
</item>
<label>I21017</label>
<item>
<term type="Secondary" subtype="priority-6">Artificial Intelligence (incl. Robotics)</term>
</item>
</list>
</keywords>
</textClass>
<langUsage>
<language ident="EN"></language>
</langUsage>
</profileDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item>
<extension>txt</extension>
<original>false</original>
<mimetype>text/plain</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-BDM27RCX-X/fulltext.txt</uri>
</json:item>
</fulltext>
<metadata>
<istex:metadataXml wicri:clean="corpus springer-ebooks not found" wicri:toSee="no header">
<istex:xmlDeclaration>version="1.0" encoding="UTF-8"</istex:xmlDeclaration>
<istex:docType PUBLIC="-//Springer-Verlag//DTD A++ V2.4//EN" URI="http://devel.springer.de/A++/V2.4/DTD/A++V2.4.dtd" name="istex:docType"></istex:docType>
<istex:document>
<Publisher>
<PublisherInfo>
<PublisherName>Springer Berlin Heidelberg</PublisherName>
<PublisherLocation>Berlin, Heidelberg</PublisherLocation>
</PublisherInfo>
<Series>
<SeriesInfo SeriesType="Series" TocLevels="0">
<SeriesID>558</SeriesID>
<SeriesPrintISSN>0302-9743</SeriesPrintISSN>
<SeriesElectronicISSN>1611-3349</SeriesElectronicISSN>
<SeriesTitle Language="En">Lecture Notes in Computer Science</SeriesTitle>
</SeriesInfo>
<SeriesHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff1">
<EditorName DisplayOrder="Western">
<GivenName>David</GivenName>
<FamilyName>Hutchison</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff2">
<EditorName DisplayOrder="Western">
<GivenName>Takeo</GivenName>
<FamilyName>Kanade</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff3">
<EditorName DisplayOrder="Western">
<GivenName>Josef</GivenName>
<FamilyName>Kittler</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff4">
<EditorName DisplayOrder="Western">
<GivenName>Jon</GivenName>
<GivenName>M.</GivenName>
<FamilyName>Kleinberg</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff5">
<EditorName DisplayOrder="Western">
<GivenName>Friedemann</GivenName>
<FamilyName>Mattern</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff6">
<EditorName DisplayOrder="Western">
<GivenName>John</GivenName>
<GivenName>C.</GivenName>
<FamilyName>Mitchell</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff7">
<EditorName DisplayOrder="Western">
<GivenName>Moni</GivenName>
<FamilyName>Naor</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff8">
<EditorName DisplayOrder="Western">
<GivenName>Oscar</GivenName>
<FamilyName>Nierstrasz</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff9">
<EditorName DisplayOrder="Western">
<GivenName>C.</GivenName>
<FamilyName>Pandu Rangan</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff10">
<EditorName DisplayOrder="Western">
<GivenName>Bernhard</GivenName>
<FamilyName>Steffen</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff11">
<EditorName DisplayOrder="Western">
<GivenName>Madhu</GivenName>
<FamilyName>Sudan</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff12">
<EditorName DisplayOrder="Western">
<GivenName>Demetri</GivenName>
<FamilyName>Terzopoulos</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff13">
<EditorName DisplayOrder="Western">
<GivenName>Doug</GivenName>
<FamilyName>Tygar</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff14">
<EditorName DisplayOrder="Western">
<GivenName>Moshe</GivenName>
<GivenName>Y.</GivenName>
<FamilyName>Vardi</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff15">
<EditorName DisplayOrder="Western">
<GivenName>Gerhard</GivenName>
<FamilyName>Weikum</FamilyName>
</EditorName>
</Editor>
<Affiliation ID="Aff1">
<OrgName>Lancaster University</OrgName>
<OrgAddress>
<City>Lancaster</City>
<Country>UK</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff2">
<OrgName>Carnegie Mellon University</OrgName>
<OrgAddress>
<City>Pittsburgh</City>
<State>PA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff3">
<OrgName>University of Surrey</OrgName>
<OrgAddress>
<City>Guildford</City>
<Country>UK</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff4">
<OrgName>Cornell University</OrgName>
<OrgAddress>
<City>Ithaca</City>
<State>NY</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff5">
<OrgName>ETH Zurich</OrgName>
<OrgAddress>
<City>Zurich</City>
<Country>Switzerland</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff6">
<OrgName>Stanford University</OrgName>
<OrgAddress>
<City>Stanford</City>
<State>CA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff7">
<OrgName>Weizmann Institute of Science</OrgName>
<OrgAddress>
<City>Rehovot</City>
<Country>Israel</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff8">
<OrgName>University of Bern</OrgName>
<OrgAddress>
<City>Bern</City>
<Country>Switzerland</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff9">
<OrgName>Indian Institute of Technology</OrgName>
<OrgAddress>
<City>Madras</City>
<Country>India</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff10">
<OrgName>University of Dortmund</OrgName>
<OrgAddress>
<City>Dortmund</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff11">
<OrgName>Massachusetts Institute of Technology</OrgName>
<OrgAddress>
<State>MA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff12">
<OrgName>University of California</OrgName>
<OrgAddress>
<City>Los Angeles</City>
<State>CA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff13">
<OrgName>University of California</OrgName>
<OrgAddress>
<City>Berkeley</City>
<State>CA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff14">
<OrgName>Rice University</OrgName>
<OrgAddress>
<City>Houston</City>
<State>TX</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff15">
<OrgName>Max-Planck Institute of Computer Science</OrgName>
<OrgAddress>
<City>Saarbrücken</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</SeriesHeader>
<Book Language="En">
<BookInfo BookProductType="Proceedings" ContainsESM="No" Language="En" MediaType="eBook" NumberingDepth="2" NumberingStyle="ContentOnly" OutputMedium="All" TocLevels="0">
<BookID>978-3-642-13094-6</BookID>
<BookTitle>Advanced Information Systems Engineering</BookTitle>
<BookSubTitle>22nd International Conference, CAiSE 2010, Hammamet, Tunisia, June 7-9, 2010. Proceedings</BookSubTitle>
<BookVolumeNumber>6051</BookVolumeNumber>
<BookSequenceNumber>6051</BookSequenceNumber>
<BookDOI>10.1007/978-3-642-13094-6</BookDOI>
<BookTitleID>211458</BookTitleID>
<BookPrintISBN>978-3-642-13093-9</BookPrintISBN>
<BookElectronicISBN>978-3-642-13094-6</BookElectronicISBN>
<BookChapterCount>41</BookChapterCount>
<BookCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2010</CopyrightYear>
</BookCopyright>
<BookSubjectGroup>
<BookSubject Code="I" Type="Primary">Computer Science</BookSubject>
<BookSubject Code="I18040" Priority="1" Type="Secondary">Information Systems Applications (incl.Internet)</BookSubject>
<BookSubject Code="I18032" Priority="2" Type="Secondary">Information Storage and Retrieval</BookSubject>
<BookSubject Code="I13022" Priority="3" Type="Secondary">Computer Communication Networks</BookSubject>
<BookSubject Code="I14029" Priority="4" Type="Secondary">Software Engineering</BookSubject>
<BookSubject Code="I18024" Priority="5" Type="Secondary">Database Management</BookSubject>
<BookSubject Code="I21017" Priority="6" Type="Secondary">Artificial Intelligence (incl. Robotics)</BookSubject>
<SubjectCollection Code="SUCO11645">Computer Science</SubjectCollection>
</BookSubjectGroup>
<BookContext>
<SeriesID>558</SeriesID>
</BookContext>
</BookInfo>
<BookHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff16">
<EditorName DisplayOrder="Western">
<GivenName>Barbara</GivenName>
<FamilyName>Pernici</FamilyName>
</EditorName>
<Contact>
<Email>barbara.pernici@polimi.it</Email>
</Contact>
</Editor>
<Affiliation ID="Aff16">
<OrgDivision>Dipartimento di Elettronica e Informazione</OrgDivision>
<OrgName>Politecnico di Milano,</OrgName>
<OrgAddress>
<Street>Piazza Leonardo da Vinci 32</Street>
<Postcode>20133</Postcode>
<City>Milano</City>
<Country>Italy</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</BookHeader>
<Part ID="Part5">
<PartInfo TocLevels="0">
<PartID>5</PartID>
<PartSequenceNumber>5</PartSequenceNumber>
<PartTitle>Session 4: Security and Management</PartTitle>
<PartChapterCount>3</PartChapterCount>
<PartContext>
<SeriesID>558</SeriesID>
<BookTitle>Advanced Information Systems Engineering</BookTitle>
</PartContext>
</PartInfo>
<Chapter ID="Chap12" Language="En">
<ChapterInfo ChapterType="OriginalPaper" ContainsESM="No" NumberingDepth="2" NumberingStyle="ContentOnly" TocLevels="0">
<ChapterID>12</ChapterID>
<ChapterDOI>10.1007/978-3-642-13094-6_12</ChapterDOI>
<ChapterSequenceNumber>12</ChapterSequenceNumber>
<ChapterTitle Language="En">Dynamic Authorisation Policies for Event-Based Task Delegation</ChapterTitle>
<ChapterFirstPage>135</ChapterFirstPage>
<ChapterLastPage>149</ChapterLastPage>
<ChapterCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2010</CopyrightYear>
</ChapterCopyright>
<ChapterGrants Type="Regular">
<MetadataGrant Grant="OpenAccess"></MetadataGrant>
<AbstractGrant Grant="OpenAccess"></AbstractGrant>
<BodyPDFGrant Grant="Restricted"></BodyPDFGrant>
<BodyHTMLGrant Grant="Restricted"></BodyHTMLGrant>
<BibliographyGrant Grant="Restricted"></BibliographyGrant>
<ESMGrant Grant="Restricted"></ESMGrant>
</ChapterGrants>
<ChapterContext>
<SeriesID>558</SeriesID>
<PartID>5</PartID>
<BookID>978-3-642-13094-6</BookID>
<BookTitle>Advanced Information Systems Engineering</BookTitle>
</ChapterContext>
</ChapterInfo>
<ChapterHeader>
<AuthorGroup>
<Author AffiliationIDS="Aff17">
<AuthorName DisplayOrder="Western">
<GivenName>Khaled</GivenName>
<FamilyName>Gaaloul</FamilyName>
</AuthorName>
<Contact>
<Email>kgaaloul@loria.fr</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff17">
<AuthorName DisplayOrder="Western">
<GivenName>Ehtesham</GivenName>
<FamilyName>Zahoor</FamilyName>
</AuthorName>
<Contact>
<Email>zahoor@loria.fr</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff17">
<AuthorName DisplayOrder="Western">
<GivenName>François</GivenName>
<FamilyName>Charoy</FamilyName>
</AuthorName>
<Contact>
<Email>charoy@loria.fr</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff17">
<AuthorName DisplayOrder="Western">
<GivenName>Claude</GivenName>
<FamilyName>Godart</FamilyName>
</AuthorName>
<Contact>
<Email>godart@loria.fr</Email>
</Contact>
</Author>
<Affiliation ID="Aff17">
<OrgName>LORIA - Nancy University - UMR 7503, BP 239</OrgName>
<OrgAddress>
<Postcode>F-54506</Postcode>
<City>Vandœuvre-lès-Nancy Cedex</City>
<Country>France</Country>
</OrgAddress>
</Affiliation>
</AuthorGroup>
<Abstract ID="Abs1" Language="En">
<Heading>Abstract</Heading>
<Para>Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are two important issues relating to delegation, namely allowing task delegation to complete, and having a secure delegation within a workflow. Delegation completion and authorisation enforcement are specified under specific constraints. Constraints are defined from the delegation context implying the presence of a fixed set of delegation events to control the delegation execution.</Para>
<Para>In this paper, we aim to reason about delegation events to specify delegation policies dynamically. To that end, we present an event-based task delegation model to monitor the delegation process. We then identify relevant events for authorisation enforcement to specify delegation policies. Moreover, we propose a technique that automates delegation policies using event calculus to control the delegation execution and increase the compliance of all delegation changes in the global policy.</Para>
</Abstract>
<KeywordGroup Language="En">
<Heading>Keywords</Heading>
<Keyword>Workflow</Keyword>
<Keyword>task</Keyword>
<Keyword>delegation</Keyword>
<Keyword>policy</Keyword>
<Keyword>event calculus</Keyword>
</KeywordGroup>
</ChapterHeader>
<NoBody></NoBody>
</Chapter>
</Part>
</Book>
</Series>
</Publisher>
</istex:document>
</istex:metadataXml>
<mods version="3.6">
<titleInfo lang="en">
<title>Dynamic Authorisation Policies for Event-Based Task Delegation</title>
</titleInfo>
<titleInfo type="alternative" contentType="CDATA">
<title>Dynamic Authorisation Policies for Event-Based Task Delegation</title>
</titleInfo>
<name type="personal">
<namePart type="given">Khaled</namePart>
<namePart type="family">Gaaloul</namePart>
<affiliation>LORIA - Nancy University - UMR 7503, BP 239, F-54506, Vandœuvre-lès-Nancy Cedex, France</affiliation>
<affiliation>E-mail: kgaaloul@loria.fr</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Ehtesham</namePart>
<namePart type="family">Zahoor</namePart>
<affiliation>LORIA - Nancy University - UMR 7503, BP 239, F-54506, Vandœuvre-lès-Nancy Cedex, France</affiliation>
<affiliation>E-mail: zahoor@loria.fr</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">François</namePart>
<namePart type="family">Charoy</namePart>
<affiliation>LORIA - Nancy University - UMR 7503, BP 239, F-54506, Vandœuvre-lès-Nancy Cedex, France</affiliation>
<affiliation>E-mail: charoy@loria.fr</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Claude</namePart>
<namePart type="family">Godart</namePart>
<affiliation>LORIA - Nancy University - UMR 7503, BP 239, F-54506, Vandœuvre-lès-Nancy Cedex, France</affiliation>
<affiliation>E-mail: godart@loria.fr</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<genre displayLabel="OriginalPaper" authority="ISTEX" authorityURI="https://content-type.data.istex.fr" type="conference" valueURI="https://content-type.data.istex.fr/ark:/67375/XTP-BFHXPBJJ-3">conference</genre>
<originInfo>
<publisher>Springer Berlin Heidelberg</publisher>
<place>
<placeTerm type="text">Berlin, Heidelberg</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2010</dateIssued>
<copyrightDate encoding="w3cdtf">2010</copyrightDate>
</originInfo>
<language>
<languageTerm type="code" authority="rfc3066">en</languageTerm>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<abstract lang="en">Abstract: Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are two important issues relating to delegation, namely allowing task delegation to complete, and having a secure delegation within a workflow. Delegation completion and authorisation enforcement are specified under specific constraints. Constraints are defined from the delegation context implying the presence of a fixed set of delegation events to control the delegation execution. In this paper, we aim to reason about delegation events to specify delegation policies dynamically. To that end, we present an event-based task delegation model to monitor the delegation process. We then identify relevant events for authorisation enforcement to specify delegation policies. Moreover, we propose a technique that automates delegation policies using event calculus to control the delegation execution and increase the compliance of all delegation changes in the global policy.</abstract>
<subject lang="en">
<genre>Keywords</genre>
<topic>Workflow</topic>
<topic>task</topic>
<topic>delegation</topic>
<topic>policy</topic>
<topic>event calculus</topic>
</subject>
<relatedItem type="host">
<titleInfo>
<title>Advanced Information Systems Engineering</title>
<subTitle>22nd International Conference, CAiSE 2010, Hammamet, Tunisia, June 7-9, 2010. Proceedings</subTitle>
</titleInfo>
<name type="personal">
<namePart type="given">Barbara</namePart>
<namePart type="family">Pernici</namePart>
<affiliation>Dipartimento di Elettronica e Informazione, Politecnico di Milano,, Piazza Leonardo da Vinci 32, 20133, Milano, Italy</affiliation>
<affiliation>E-mail: barbara.pernici@polimi.it</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<genre type="book-series" authority="ISTEX" authorityURI="https://publication-type.data.istex.fr" valueURI="https://publication-type.data.istex.fr/ark:/67375/JMC-0G6R5W5T-Z">book-series</genre>
<originInfo>
<publisher>Springer</publisher>
<copyrightDate encoding="w3cdtf">2010</copyrightDate>
<issuance>monographic</issuance>
</originInfo>
<subject>
<genre>Book-Subject-Collection</genre>
<topic authority="SpringerSubjectCodes" authorityURI="SUCO11645">Computer Science</topic>
</subject>
<subject>
<genre>Book-Subject-Group</genre>
<topic authority="SpringerSubjectCodes" authorityURI="I">Computer Science</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I18040">Information Systems Applications (incl.Internet)</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I18032">Information Storage and Retrieval</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I13022">Computer Communication Networks</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I14029">Software Engineering</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I18024">Database Management</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I21017">Artificial Intelligence (incl. Robotics)</topic>
</subject>
<identifier type="DOI">10.1007/978-3-642-13094-6</identifier>
<identifier type="ISBN">978-3-642-13093-9</identifier>
<identifier type="eISBN">978-3-642-13094-6</identifier>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="BookTitleID">211458</identifier>
<identifier type="BookID">978-3-642-13094-6</identifier>
<identifier type="BookChapterCount">41</identifier>
<identifier type="BookVolumeNumber">6051</identifier>
<identifier type="BookSequenceNumber">6051</identifier>
<identifier type="PartChapterCount">3</identifier>
<part>
<date>2010</date>
<detail type="part">
<title>Session 4: Security and Management</title>
</detail>
<detail type="volume">
<number>6051</number>
<caption>vol.</caption>
</detail>
<extent unit="pages">
<start>135</start>
<end>149</end>
</extent>
</part>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2010</recordOrigin>
</recordInfo>
</relatedItem>
<relatedItem type="series">
<titleInfo>
<title>Lecture Notes in Computer Science</title>
</titleInfo>
<name type="personal">
<namePart type="given">David</namePart>
<namePart type="family">Hutchison</namePart>
<affiliation>Lancaster University, Lancaster, UK</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Takeo</namePart>
<namePart type="family">Kanade</namePart>
<affiliation>Carnegie Mellon University, Pittsburgh, PA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Josef</namePart>
<namePart type="family">Kittler</namePart>
<affiliation>University of Surrey, Guildford, UK</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jon</namePart>
<namePart type="given">M.</namePart>
<namePart type="family">Kleinberg</namePart>
<affiliation>Cornell University, Ithaca, NY, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Friedemann</namePart>
<namePart type="family">Mattern</namePart>
<affiliation>ETH Zurich, Zurich, Switzerland</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">John</namePart>
<namePart type="given">C.</namePart>
<namePart type="family">Mitchell</namePart>
<affiliation>Stanford University, Stanford, CA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moni</namePart>
<namePart type="family">Naor</namePart>
<affiliation>Weizmann Institute of Science, Rehovot, Israel</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Oscar</namePart>
<namePart type="family">Nierstrasz</namePart>
<affiliation>University of Bern, Bern, Switzerland</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">C.</namePart>
<namePart type="family">Pandu Rangan</namePart>
<affiliation>Indian Institute of Technology, Madras, India</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Bernhard</namePart>
<namePart type="family">Steffen</namePart>
<affiliation>University of Dortmund, Dortmund, Germany</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Madhu</namePart>
<namePart type="family">Sudan</namePart>
<affiliation>Massachusetts Institute of Technology, MA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Demetri</namePart>
<namePart type="family">Terzopoulos</namePart>
<affiliation>University of California, Los Angeles, CA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Doug</namePart>
<namePart type="family">Tygar</namePart>
<affiliation>University of California, Berkeley, CA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moshe</namePart>
<namePart type="given">Y.</namePart>
<namePart type="family">Vardi</namePart>
<affiliation>Rice University, Houston, TX, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Gerhard</namePart>
<namePart type="family">Weikum</namePart>
<affiliation>Max-Planck Institute of Computer Science, Saarbrücken, Germany</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<originInfo>
<publisher>Springer</publisher>
<copyrightDate encoding="w3cdtf">2010</copyrightDate>
<issuance>serial</issuance>
</originInfo>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="SeriesID">558</identifier>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2010</recordOrigin>
</recordInfo>
</relatedItem>
<identifier type="istex">E55CF792E842AC2AA2D562CC6BA71C6A6C234741</identifier>
<identifier type="ark">ark:/67375/HCB-BDM27RCX-X</identifier>
<identifier type="DOI">10.1007/978-3-642-13094-6_12</identifier>
<identifier type="ChapterID">12</identifier>
<identifier type="ChapterID">Chap12</identifier>
<accessCondition type="use and reproduction" contentType="copyright">Springer-Verlag Berlin Heidelberg, 2010</accessCondition>
<recordInfo>
<recordContentSource authority="ISTEX" authorityURI="https://loaded-corpus.data.istex.fr" valueURI="https://loaded-corpus.data.istex.fr/ark:/67375/XBH-RLRX46XW-4">springer</recordContentSource>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2010</recordOrigin>
</recordInfo>
</mods>
<json:item>
<extension>json</extension>
<original>false</original>
<mimetype>application/json</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-BDM27RCX-X/record.json</uri>
</json:item>
</metadata>
</istex>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Istex/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 003714 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Corpus/biblio.hfd -nk 003714 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    Istex
   |étape=   Corpus
   |type=    RBID
   |clé=     ISTEX:E55CF792E842AC2AA2D562CC6BA71C6A6C234741
   |texte=   Dynamic Authorisation Policies for Event-Based Task Delegation
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022