ences to expressions. Only expressions referenced by
macros have to be changed.
REFERENCES
Benantar, M. (2006). Access Control Systems: Secu-
rity, Identity Management and Trust Models. Access
Control Systems: Security, Identity Management and
Trust Models. Springer.
Chen, L. (2011). Analyzing and Developing Role-Based Ac-
cess Control Models. PhD thesis, University of Lon-
don.
Chen, Y. and Zhang, L. (2011). Research on role-based
dynamic access control. In Proceedings of the 2011
iConference, iConference ’11, pages 657–660, New
York, NY, USA. ACM.
Ferraiolo, D., Kuhn, D., and Chandramouli, R. (2003).
Role-based Access Control. Artech House computer
security series. Artech House.
Ferraiolo, D. F., Barkley, J. F., and Kuhn, D. R. (1999). A
role-based access control model and reference imple-
mentation within a corporate intranet. ACM Trans. Inf.
Syst. Secur., 2:34–64.
Ferraiolo, D. F., Sandhu, R., Gavrila, S., Kuhn, D. R., and
Chandramouli, R. (2001). Proposed NIST standard
for role-based access control. ACM Transactions on
Information and System Security, 4:224–274.
Ferrari, E. (2010). Access Control in Data Management
Systems. Synthesis lectures on data management.
Morgan & Claypool.
Fowler, M. (2010). Domain-Specific Languages. Addison-
Wesley Professional.
Gallo, G., Longo, G., Pallottino, S., and Nguyen, S. (1993).
Directed Hypergraphs and Applications. Discrete
Appl. Math., 42(2-3):177–201.
Graham, G. S. and Denning, P. J. (1972). Protection: Prin-
ciples and Practice. In Proceedings of the May 16-18,
1972, Spring Joint Computer Conference, AFIPS ’72
(Spring), pages 417–429, New York, NY, USA. ACM.
Hoffmann, D. W. (2011). Theoretische Informatik.
M
¨
unchen: Carl Hanser, M
¨
unchen, 2. edition.
Knorr, K. (2000). Dynamic access control through Petri net
workflows. In Computer Security Applications, 2000.
ACSAC ’00. 16th Annual Conference, pages 159–167.
Krcmar, H. (2010). Informationsmanagement. Springer,
Berlin; Heidelberg.
Lawall, A., Schaller, T., and Reichelt, D. (2012). An
Approach towards Subject-Oriented Access Control.
In S-BPM ONE 2012, pages 33–42, Heidelberg.
Springer-Verlag.
Lawall, A., Schaller, T., and Reichelt, D. (2013a). Integra-
tion of Dynamic Role Resolution within the S-BPM
Approach. In S-BPM ONE 2013, pages 21–33, Hei-
delberg. Springer.
Lawall, A., Schaller, T., and Reichelt, D. (2013b). Who
Does What – Comparison of Approaches for the Def-
inition of Agents in Workflows. In Web Intelligence
(WI) and Intelligent Agent Technologies (IAT), 2013
IEEE/WIC/ACM International Joint Conferences on,
volume 3, pages 74–77.
Lawall, A., Schaller, T., and Reichelt, D. (2014a). Cross-
Organizational and Context-Sensitive Modeling of
Organizational Dependencies in C-ORG. In S-BPM
ONE (Scientific Research), pages 89–109, Heidelberg.
Springer-Verlag.
Lawall, A., Schaller, T., and Reichelt, D. (2014b). Enter-
prise Architecture: A Formalism for Modeling Orga-
nizational Structures in Information Systems. In Bar-
jis, J. and Pergl, R., editors, Enterprise and Organiza-
tional Modeling and Simulation, volume 191 of Lec-
ture Notes in Business Information Processing, pages
77–95. Springer Berlin Heidelberg.
Lawall, A., Schaller, T., and Reichelt, D. (2014c). Local-
Global Agent Failover Based on Organizational Mod-
els. In Web Intelligence (WI) and Intelligent Agent
Technologies (IAT), 2014 IEEE/WIC/ACM Interna-
tional Joint Conferences on, volume 3, pages 420–
427.
Lawall, A., Schaller, T., and Reichelt, D. (2014d). Re-
stricted Relations between Organizations for Cross-
Organizational Processes. In Business Informatics
(CBI), 2014 IEEE 16th Conference on, pages 74–80,
Geneva.
Liu, Y. A., Wang, C., Gorbovitski, M., Rothamel, T.,
Cheng, Y., Zhao, Y., and Zhang, J. (2006). Core
Role-based Access Control: Efficient Implementa-
tions by Transformations. In Proceedings of the 2006
ACM SIGPLAN Symposium on Partial Evaluation and
Semantics-based Program Manipulation, PEPM ’06,
pages 112–120, New York, NY, USA. ACM.
Sandhu, R. S. (1992). The Typed Access Matrix Model.
In Proceedings of the 1992 IEEE Symposium on Secu-
rity and Privacy, SP ’92, pages 122–136, Washington,
DC, USA. IEEE Computer Society.
Sandhu, R. S. (1998). Role-Based Access Control. Ad-
vances in Computers, 46:237–286.
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman,
C. E. (1996). Role-Based Access Control Models.
Computer, 29(2):38–47.
Saunders, G., Hitchens, M., and Varadharajan, V. (2001).
Role-based Access Control and the Access Control
Matrix. SIGOPS Oper. Syst. Rev., 35(4):6–20.
Seufert, S. E. (2002). Die Zugriffskontrolle. PhD thesis,
Bamberg, Univ., Diss., 2002.
Vahs, D. (2007). Organisation: Einf
¨
uhrung in die Organi-
sationstheorie und -praxis. Sch
¨
affer-Poeschel.
Williamson, G., Sharoni, I., Yip, D., and Spaulding, K.
(2009). Identity Management: A Primer. Mc Press
Series. MC Press Online.
DATA2015-4thInternationalConferenceonDataManagementTechnologiesandApplications
278