{"id":"https://openalex.org/W1792092777","doi":"https://doi.org/10.1109/cscwd.2002.1047718","title":"Petri-net-based context-related access control in workflow environment","display_name":"Petri-net-based context-related access control in workflow environment","publication_year":2003,"publication_date":"2003-06-25","ids":{"openalex":"https://openalex.org/W1792092777","doi":"https://doi.org/10.1109/cscwd.2002.1047718","mag":"1792092777"},"language":"en","primary_location":{"id":"doi:10.1109/cscwd.2002.1047718","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd.2002.1047718","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 7th International Conference on Computer Supported Cooperative Work in Design","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001402526","display_name":"Xin Luna Dong","orcid":"https://orcid.org/0009-0000-8667-322X"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xin Dong","raw_affiliation_strings":["State Key Laboratory of CAD & CG, University of Zhejiang, Hangzhou, Zhejiang, China","State Key Lab., Zhejiang Univ., China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of CAD & CG, University of Zhejiang, Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"State Key Lab., Zhejiang Univ., China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072882183","display_name":"Gang Chen","orcid":"https://orcid.org/0000-0003-4262-9491"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gang Chen","raw_affiliation_strings":["State Key Laboratory of CAD & CG, University of Zhejiang, Hangzhou, Zhejiang, China","State Key Lab., Zhejiang Univ., China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of CAD & CG, University of Zhejiang, Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"State Key Lab., Zhejiang Univ., China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069353502","display_name":"Jianwei Yin","orcid":"https://orcid.org/0000-0003-4703-7348"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianwei Yin","raw_affiliation_strings":["State Key Laboratory of CAD & CG, University of Zhejiang, Hangzhou, Zhejiang, China","State Key Lab., Zhejiang Univ., China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of CAD & CG, University of Zhejiang, Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"State Key Lab., Zhejiang Univ., China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111976947","display_name":"Jinxiang Dong","orcid":null},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinxiang Dong","raw_affiliation_strings":["State Key Laboratory of CAD & CG, University of Zhejiang, Hangzhou, Zhejiang, China","State Key Lab., Zhejiang Univ., China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of CAD & CG, University of Zhejiang, Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"State Key Lab., Zhejiang Univ., China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5001402526"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":3.4563,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.9298225,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"381","last_page":"384"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.8733336925506592},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.8499729633331299},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8296735882759094},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.822763204574585},{"id":"https://openalex.org/keywords/petri-net","display_name":"Petri net","score":0.767490804195404},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6166031360626221},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5197198390960693},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.5110515356063843},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.5008716583251953},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4998040199279785},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4837520122528076},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4192812740802765},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41670089960098267},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3283218443393707},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14760556817054749},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.13429909944534302}],"concepts":[{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.8733336925506592},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.8499729633331299},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8296735882759094},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.822763204574585},{"id":"https://openalex.org/C38677869","wikidata":"https://www.wikidata.org/wiki/Q724168","display_name":"Petri net","level":2,"score":0.767490804195404},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6166031360626221},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5197198390960693},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.5110515356063843},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.5008716583251953},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4998040199279785},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4837520122528076},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4192812740802765},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41670089960098267},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3283218443393707},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14760556817054749},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.13429909944534302},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cscwd.2002.1047718","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd.2002.1047718","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 7th International Conference on Computer Supported Cooperative Work in Design","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.343.4202","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.343.4202","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5199999809265137,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1492051944","https://openalex.org/W1996109622","https://openalex.org/W2117804751","https://openalex.org/W2122114768","https://openalex.org/W2129466958","https://openalex.org/W2132142278","https://openalex.org/W2136950416","https://openalex.org/W2154765153","https://openalex.org/W2166602595","https://openalex.org/W2984672479","https://openalex.org/W6629604031"],"related_works":["https://openalex.org/W2372156812","https://openalex.org/W2374393728","https://openalex.org/W2386545329","https://openalex.org/W2555738791","https://openalex.org/W1990260561","https://openalex.org/W1593822213","https://openalex.org/W2357728851","https://openalex.org/W2017675414","https://openalex.org/W2367441718","https://openalex.org/W2355345331"],"abstract_inverted_index":{"Access":[0],"control,":[1,29],"which":[2,47],"is":[3,13],"one":[4],"of":[5,10,27,42,77,92,100],"the":[6,24,32,43,48,58,61,78,90,98,115],"most":[7],"important":[8,17],"aspects":[9],"security":[11],"services,":[12],"becoming":[14],"increasingly":[15],"an":[16],"challenge":[18],"in":[19,46],"workflow":[20],"management":[21],"systems.":[22],"However,":[23],"traditional":[25,79],"models":[26,39,54],"access":[28,34,117],"such":[30],"as":[31,72,110],"role-based":[33],"control":[35,118],"(RBAC),":[36],"are":[37,50],"static":[38,80],"without":[40],"recognition":[41],"dynamic":[44,63,74],"environments":[45,64],"workflows":[49],"rooted.":[51],"These":[52],"context-independent":[53],"rarely":[55],"can":[56],"meet":[57],"requirements":[59],"that":[60],"highly":[62],"raise.":[65],"In":[66],"this":[67,120],"paper,":[68],"we":[69,105],"regard":[70],"authorization":[71,94],"a":[73,107,111],"process":[75,102],"instead":[76],"view":[81],"and":[82,96],"take":[83],"two":[84],"contextual":[85],"factors":[86],"into":[87],"account:":[88],"(1)":[89],"state":[91,99],"related":[93,101],"processes;":[95],"(2)":[97],"instances.":[103],"Then,":[104],"propose":[106],"Petri-net-based":[108],"model":[109],"practical":[112],"solution":[113],"to":[114],"context-sensitive":[116],"on":[119],"basis.":[121]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
