Abstract: One of the noteworthy investigations in workflows is the implementation of authorization-related security requirements. There are two typical security requirements, i.e., separation of duty ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results