{"id":"https://openalex.org/W2057028717","doi":"https://doi.org/10.1145/1063979.1063986","title":"A reference monitor for workflow systems with constrained task execution","display_name":"A reference monitor for workflow systems with constrained task execution","publication_year":2005,"publication_date":"2005-06-01","ids":{"openalex":"https://openalex.org/W2057028717","doi":"https://doi.org/10.1145/1063979.1063986","mag":"2057028717"},"language":"en","primary_location":{"id":"doi:10.1145/1063979.1063986","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1063979.1063986","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the tenth ACM symposium on Access control models and technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109050799","display_name":"Jason Crampton","orcid":"https://orcid.org/0000-0003-2151-8426"},"institutions":[{"id":"https://openalex.org/I4210160447","display_name":"Universidad de Londres","ror":"https://ror.org/054v4yq51","country_code":"MX","type":"education","lineage":["https://openalex.org/I4210160447"]}],"countries":["MX"],"is_corresponding":true,"raw_author_name":"Jason Crampton","raw_affiliation_strings":["University of London"],"affiliations":[{"raw_affiliation_string":"University of London","institution_ids":["https://openalex.org/I4210160447"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5109050799"],"corresponding_institution_ids":["https://openalex.org/I4210160447"],"apc_list":null,"apc_paid":null,"fwci":21.6089,"has_fulltext":false,"cited_by_count":122,"citation_normalized_percentile":{"value":0.9914047,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"38","last_page":"47"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9860000014305115,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.8755998611450195},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8421131372451782},{"id":"https://openalex.org/keywords/cardinality","display_name":"Cardinality (data modeling)","score":0.6983411312103271},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.6053612232208252},{"id":"https://openalex.org/keywords/workflow-technology","display_name":"Workflow technology","score":0.5931230783462524},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5672304630279541},{"id":"https://openalex.org/keywords/workflow-management-system","display_name":"Workflow management system","score":0.5671690702438354},{"id":"https://openalex.org/keywords/workflow-engine","display_name":"Workflow engine","score":0.5398696064949036},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5132498741149902},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4773994982242584},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.4396592378616333},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.34670156240463257},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33188652992248535},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.30863165855407715},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.11889231204986572}],"concepts":[{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.8755998611450195},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8421131372451782},{"id":"https://openalex.org/C87117476","wikidata":"https://www.wikidata.org/wiki/Q362383","display_name":"Cardinality (data modeling)","level":2,"score":0.6983411312103271},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.6053612232208252},{"id":"https://openalex.org/C19612761","wikidata":"https://www.wikidata.org/wiki/Q8034836","display_name":"Workflow technology","level":3,"score":0.5931230783462524},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5672304630279541},{"id":"https://openalex.org/C140824633","wikidata":"https://www.wikidata.org/wiki/Q2808660","display_name":"Workflow management system","level":3,"score":0.5671690702438354},{"id":"https://openalex.org/C188220564","wikidata":"https://www.wikidata.org/wiki/Q3325097","display_name":"Workflow engine","level":3,"score":0.5398696064949036},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5132498741149902},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4773994982242584},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.4396592378616333},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.34670156240463257},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33188652992248535},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.30863165855407715},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.11889231204986572},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1063979.1063986","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1063979.1063986","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the tenth ACM symposium on Access control models and technologies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7400000095367432,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1503568870","https://openalex.org/W1538129883","https://openalex.org/W1573033214","https://openalex.org/W1595655245","https://openalex.org/W1605921716","https://openalex.org/W1639227833","https://openalex.org/W1840655788","https://openalex.org/W1992761401","https://openalex.org/W2021079739","https://openalex.org/W2026913455","https://openalex.org/W2038953226","https://openalex.org/W2058451842","https://openalex.org/W2134167896","https://openalex.org/W2145857528","https://openalex.org/W2152505375","https://openalex.org/W2163283609"],"related_works":["https://openalex.org/W2379425324","https://openalex.org/W2373541195","https://openalex.org/W2376410910","https://openalex.org/W2091596831","https://openalex.org/W2365658322","https://openalex.org/W2352344200","https://openalex.org/W329008868","https://openalex.org/W2367975678","https://openalex.org/W2375552622","https://openalex.org/W2906819665"],"abstract_inverted_index":{"We":[0,26,82,103],"describe":[1],"a":[2,28,57,91],"model,":[3],"independent":[4],"of":[5,18,30,38,71,108],"any":[6],"underlying":[7],"access":[8],"control":[9],"paradigm,":[10],"for":[11,47],"specifying":[12],"authorization":[13,39,80],"constraints":[14,22],"such":[15],"as":[16],"separation":[17],"duty":[19],"and":[20,111],"cardinality":[21],"in":[23,118],"workflow":[24,60,75,92,99],"systems.":[25],"present":[27],"number":[29],"results":[31,42],"enabling":[32],"us":[33],"to":[34,54,74,115],"simplify":[35],"the":[36,44,79,105,119],"set":[37],"constraints.":[40],"These":[41],"form":[43],"theoretical":[45],"foundation":[46],"an":[48,69],"algorithm":[49,86,110],"that":[50,64,77,84,95,97],"can":[51,61,87,101],"be":[52,62,88],"used":[53],"determine":[55],"whether":[56],"given":[58],"constrained":[59],"satisfied:":[63],"is,":[65],"does":[66],"there":[67],"exist":[68],"assignment":[70],"authorized":[72],"users":[73],"tasks":[76],"satisfies":[78],"constraints?":[81],"show":[83],"this":[85],"incorporated":[89],"into":[90],"reference":[93],"monitor":[94],"guarantees":[96],"every":[98],"instance":[100],"complete.":[102],"derive":[104],"computational":[106],"complexity":[107],"our":[109],"compare":[112],"its":[113],"performance":[114],"comparable":[116],"work":[117],"literature.":[120]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":8},{"year":2015,"cited_by_count":14},{"year":2014,"cited_by_count":9},{"year":2013,"cited_by_count":11},{"year":2012,"cited_by_count":15}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
