{"id":"https://openalex.org/W1901910756","doi":"https://doi.org/10.1007/978-3-540-77010-7_15","title":"Deriving XACML Policies from Business Process Models","display_name":"Deriving XACML Policies from Business Process Models","publication_year":2007,"publication_date":"2007-01-01","ids":{"openalex":"https://openalex.org/W1901910756","doi":"https://doi.org/10.1007/978-3-540-77010-7_15","mag":"1901910756"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-77010-7_15","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-77010-7_15","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040358274","display_name":"Christian Wolter","orcid":"https://orcid.org/0000-0002-2819-2900"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Christian Wolter","raw_affiliation_strings":["SAP Research, Vincenz-Priessnitz-Str. 1, 76131 Karlsruhe, Germany","SAP Research, Karlsruhe, Germany#TAB#"],"affiliations":[{"raw_affiliation_string":"SAP Research, Vincenz-Priessnitz-Str. 1, 76131 Karlsruhe, Germany","institution_ids":[]},{"raw_affiliation_string":"SAP Research, Karlsruhe, Germany#TAB#","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045623537","display_name":"Andreas Schaad","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Andreas Schaad","raw_affiliation_strings":["SAP Research, Vincenz-Priessnitz-Str. 1, 76131 Karlsruhe, Germany","SAP Research, Karlsruhe, Germany#TAB#"],"affiliations":[{"raw_affiliation_string":"SAP Research, Vincenz-Priessnitz-Str. 1, 76131 Karlsruhe, Germany","institution_ids":[]},{"raw_affiliation_string":"SAP Research, Karlsruhe, Germany#TAB#","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102919398","display_name":"Christoph Meinel","orcid":"https://orcid.org/0000-0002-3410-3193"},"institutions":[{"id":"https://openalex.org/I176453806","display_name":"University of Potsdam","ror":"https://ror.org/03bnmw459","country_code":"DE","type":"education","lineage":["https://openalex.org/I176453806"]},{"id":"https://openalex.org/I143288331","display_name":"Hasso Plattner Institute","ror":"https://ror.org/058rn5r42","country_code":"DE","type":"facility","lineage":["https://openalex.org/I143288331","https://openalex.org/I176453806"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Christoph Meinel","raw_affiliation_strings":["Hasso-Plattner-Institute (HPI) for IT Systems Engineering, University of Potsdam, Germany","Hasso-Plattner-Institute for IT Systems Engineering, University of Potsdam, Germany#TAB#"],"affiliations":[{"raw_affiliation_string":"Hasso-Plattner-Institute (HPI) for IT Systems Engineering, University of Potsdam, Germany","institution_ids":["https://openalex.org/I143288331","https://openalex.org/I176453806"]},{"raw_affiliation_string":"Hasso-Plattner-Institute for IT Systems Engineering, University of Potsdam, Germany#TAB#","institution_ids":["https://openalex.org/I143288331"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5040358274"],"corresponding_institution_ids":[],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":24.8219,"has_fulltext":false,"cited_by_count":38,"citation_normalized_percentile":{"value":0.99473516,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"142","last_page":"153"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/xacml","display_name":"XACML","score":0.9664660096168518},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8209953308105469},{"id":"https://openalex.org/keywords/business-process-model-and-notation","display_name":"Business Process Model and Notation","score":0.7813074588775635},{"id":"https://openalex.org/keywords/markup-language","display_name":"Markup language","score":0.6724827289581299},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5740095973014832},{"id":"https://openalex.org/keywords/business-process","display_name":"Business process","score":0.5351306796073914},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.5285954475402832},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.5184721350669861},{"id":"https://openalex.org/keywords/business-process-modeling","display_name":"Business process modeling","score":0.514090359210968},{"id":"https://openalex.org/keywords/xml","display_name":"XML","score":0.4839937686920166},{"id":"https://openalex.org/keywords/notation","display_name":"Notation","score":0.44930699467658997},{"id":"https://openalex.org/keywords/business-rule","display_name":"Business rule","score":0.42607975006103516},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.4215957820415497},{"id":"https://openalex.org/keywords/process-modeling","display_name":"Process modeling","score":0.41398608684539795},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.32084769010543823},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2371702492237091},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2254331111907959},{"id":"https://openalex.org/keywords/work-in-process","display_name":"Work in process","score":0.16027051210403442}],"concepts":[{"id":"https://openalex.org/C2779886121","wikidata":"https://www.wikidata.org/wiki/Q288682","display_name":"XACML","level":3,"score":0.9664660096168518},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8209953308105469},{"id":"https://openalex.org/C179299601","wikidata":"https://www.wikidata.org/wiki/Q1017605","display_name":"Business Process Model and Notation","level":5,"score":0.7813074588775635},{"id":"https://openalex.org/C45874996","wikidata":"https://www.wikidata.org/wiki/Q37045","display_name":"Markup language","level":3,"score":0.6724827289581299},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5740095973014832},{"id":"https://openalex.org/C85345410","wikidata":"https://www.wikidata.org/wiki/Q851587","display_name":"Business process","level":3,"score":0.5351306796073914},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5285954475402832},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.5184721350669861},{"id":"https://openalex.org/C207505557","wikidata":"https://www.wikidata.org/wiki/Q4374012","display_name":"Business process modeling","level":4,"score":0.514090359210968},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.4839937686920166},{"id":"https://openalex.org/C45357846","wikidata":"https://www.wikidata.org/wiki/Q2001982","display_name":"Notation","level":2,"score":0.44930699467658997},{"id":"https://openalex.org/C11066294","wikidata":"https://www.wikidata.org/wiki/Q1518244","display_name":"Business rule","level":4,"score":0.42607975006103516},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.4215957820415497},{"id":"https://openalex.org/C76956256","wikidata":"https://www.wikidata.org/wiki/Q27610560","display_name":"Process modeling","level":3,"score":0.41398608684539795},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.32084769010543823},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2371702492237091},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2254331111907959},{"id":"https://openalex.org/C174998907","wikidata":"https://www.wikidata.org/wiki/Q357662","display_name":"Work in process","level":2,"score":0.16027051210403442},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-540-77010-7_15","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-77010-7_15","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W204857870","https://openalex.org/W1501633995","https://openalex.org/W1506229097","https://openalex.org/W1518234761","https://openalex.org/W1524147119","https://openalex.org/W1529416851","https://openalex.org/W1640327256","https://openalex.org/W1840655788","https://openalex.org/W2027060223","https://openalex.org/W2038953226","https://openalex.org/W2085120047","https://openalex.org/W2109361291","https://openalex.org/W2113175940","https://openalex.org/W2118930213","https://openalex.org/W2128512114","https://openalex.org/W2154911336","https://openalex.org/W2160724118","https://openalex.org/W2253460927","https://openalex.org/W4239822923","https://openalex.org/W4242457209","https://openalex.org/W6628980590"],"related_works":["https://openalex.org/W2298494124","https://openalex.org/W2125405387","https://openalex.org/W2049536973","https://openalex.org/W3144583911","https://openalex.org/W2048884112","https://openalex.org/W2511940485","https://openalex.org/W1543516846","https://openalex.org/W1908225099","https://openalex.org/W2340898265","https://openalex.org/W93556318"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
