[1] WANG Q,Li N.Satisfiability and resiliency in workflow authorization systems[J]. ACM Transactions on Information and System Security,2010,13(4):1-35.
[2] BERTINO E,FERRARI E,ATLURI V.The specification and enforcement of authorization constraints in workflow management systems[J]. ACM Transactions on Information System Security.1999,2(1):65-104.
[3] ATLURI V,BERTINO E,FERRARI E,et al.Supporting delegation in secure workflow management systems[A]. Proceedings of the 17th Annual Conference on Data and Application of Security[C]. Berlin,GER:Springer,2003.190-202.
[4] CRAMPTON J,KHAMBHAMMETTU H.Delegation and satisfiability in workflow systems[A]. Proceedings of the 13th ACM Symposium on Access Control Models and Technologies[C]. NY,USA:ACM,2008.31-40.
[5] CRAMPTON J,GUTIN G.Constraint expressions and workflow satisfiability[A]. Proceedings of the 18th ACM Symposium on Access Control Models and Technologies[C]. NY,USA:ACM,2013.73-84.
[6] CRAMPTON J,GUTIN G,YEO A.On the parameterized complexity and kernelization of the workflow satisfiability problem[J]. ACM Transactions on Information and System Security,2013,16(1):1-31.
[7] BJORCLUND A,HUSFELDT T,KOIVISTO M.Set partitioning via inclusion-exclusion[J]. SIAM Journal on Computing,2009,39(2):546-563.
[8] THURLEY M.Sharp SAT counting models with advanced caching and implicit BCP[A]. Proc of the 9th International Conference on Theory and Applications of Satisfiability Testing[C]. Berlin,GER:Springer,2006.424-429.
[9] THURLEY M.SharpSAT[EB/OL]. https://github.com/marcthurley/sharpSAT,2013-02. |