Mathematics
Security Policy
100%
Security Model
82%
Access Control
49%
Programming
29%
Runtime Systems
20%
Data Integrity
19%
Non-repudiation
18%
Confidentiality
15%
Work Flow
14%
Authentication
14%
Dynamic Control
14%
Conflict
11%
Policy
10%
History
9%
Requirements
8%
Workflow Management System
8%
Sufficient
7%
Demonstrate
6%
Model
3%
Social Sciences
workflow management
83%
security policy
55%
programming
20%
data access
11%
conflict of interest
9%
workflow
9%
Confidentiality
8%
integrity
7%
time
6%
history
4%
Engineering & Materials Science
Dynamical systems
42%
Application programming interfaces (API)
24%
Access control
24%
Industry
7%
Authentication
7%