A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2006; you can also visit the original URL.
The file type is
Computers & security
Workflow Systems are increasingly being used to streamline organizations' business processes. During the execution of business processes, information often traverses organizations' networks as documents. With the proliferation of the Internet, documents travel across open networks. These documents can, however, contain potentially sensitive information. The documents used in Workflow Systems must therefore be protected from unauthorized access. This paper enumerates three access controldoi:10.1016/s0167-4048(01)00613-7 fatcat:s7pw2fav5ncvlibqp6gngleoqe