Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: ACM Conference on Computer and Communications Security, 2001
Guest editors: Sabrina De Capitani di Vimercati
Article type: Research Article
Authors: Atluri, Vijayalakshmia; ** | Chun, Soon Aeb | Mazzoleni, Pietroc
Affiliations: [a] MSIS Department and CIMIC, Rutgers University, 180 University Avenue, Newark, NJ 07102, USA. E-mail: [email protected] | [b] CDS Department, Seton Hall University, NJ 07019, USA. E-mail: [email protected] | [c] University of Milan, Italy. E-mail: [email protected]
Correspondence: [**] Corresponding author.
Note: [*] This work was supported in part by the National Science Foundation under grant EIA-9983468. The work of P. Mazzoleni was conducted while he was visiting Rutgers during 2001–2002. A preliminary version of this work appeared in the Proceedings of the ACM Conference on Computer and Communication Security, 2001.
Abstract: Workflow systems are gaining importance as an infrastructure for automating inter-organizational interactions, such as those in Electronic Commerce. In such an environment, a centralized Workflow Management System is not desirable because: (i) it can be a performance bottleneck, and (ii) the systems are inherently distributed, heterogeneous, and autonomous in nature. Decentralized execution of inter-organizational workflows may raise a number of security issues including those related to conflict-of-interest among competing organizations. In this paper, we first provide an approach to realize decentralized workflow execution, in which the workflow is divided into partitions, called self-describing workflows, and handled by a light weight workflow management component, called workflow stub, located at each organizational agent. Second, we identify the limitations of the traditional workflow model with respect to expressing the various types of join dependencies and extend the traditional workflow model suitably. Distinguishing the different types of dependencies among tasks is essential in the efficient execution of self-describing workflows. Finally, we recognize that placing the task execution agents that belong to the same conflict-of-interest class in one self-describing workflow may lead to unfair, and in some cases, undesirable results, akin to being on the wrong side of the Chinese wall. Therefore, to address the conflict-of-interest issues that arise in competitive business environments, we propose a decentralized workflow Chinese wall security model. We propose a restrictive partitioning solution to enforce the proposed model.
Keywords: Workflow management systems, Distributed Systems, Chinese wall security
DOI: 10.3233/JCS-2004-12601
Journal: Journal of Computer Security, vol. 12, no. 6, pp. 799-840, 2004
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]