Modelling inter-organizational workflow security in a peer-to-peer environment

被引:0
|
作者
Hafner, M [1 ]
Breu, M [1 ]
Breu, R [1 ]
Nowak, A [1 ]
机构
[1] Univ Innsbruck, Inst Informat, A-6020 Innsbruck, Austria
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The many conflicting technical, organizational, legal and domain-level constraints make the implementation of secure, inter-organizational workflows a very complex task, which is bound to low-level technical knowledge and error prone. The SECTINO project provides a framework for the realization and the high-level management of security-critical workflows based on the paradigm of Model Driven Security. In our case the models are translated into runtime artefacts that configure a target reference architecture based on web services technologies. In this paper we focus on the Global Workflow Model, which captures the message exchange protocol between partners cooperating in a distributed environments well as basic security patterns. We show how the model maps to workflow and security components of the hosting environments at the partner nodes.
引用
收藏
页码:533 / 540
页数:8
相关论文
共 50 条
  • [1] Modelling inter-organizational workflow security in a peer-to-peer environment
    Nowak, Andrea
    Hafner, Michael
    Breu, Michael
    Breu, Ruth
    ENTERPRISE INTEROPERABILITY: NEW CHALLENGES AND APPROACHES, 2007, : 509 - +
  • [2] Combining ontologies and peer-to-peer technologies for inter-organizational knowledge management
    Stuckenschmidt, Heiner
    Siberski, Wolf
    Nejdl, Wolfgang
    LEARNING ORGANIZATION, 2005, 12 (05): : 480 - +
  • [3] AN INTER-ORGANIZATIONAL PEER-TO-PEER WORKFLOW MANAGEMENT SYSTEM P2P based Virtual Organization Concept
    Aldeeb, A.
    Crockett, K.
    Stanton, M. J.
    ICEIS 2008 : PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL SAIC: SOFTWARE AGENTS AND INTERNET COMPUTING, 2008, : 85 - 92
  • [4] Security in a peer-to-peer distributed virtual environment
    Köhnlein, J
    PARALLEL COMPUTING: SOFTWARE TECHNOLOGY, ALGORITHMS, ARCHITECTURES AND APPLICATIONS, 2004, 13 : 587 - 597
  • [5] Peer-to-peer based grid workflow runtime environment of SwinDeW-G
    Yang, Yun
    Liu, Ke
    Chen, Jinjun
    Lignier, Joel
    Jin, Hai
    E-SCIENCE 2007: THIRD IEEE INTERNATIONAL CONFERENCE ON E-SCIENCE AND GRID COMPUTING, PROCEEDINGS, 2007, : 51 - +
  • [6] A peer-to-peer architecture for workflow in virtual enterprises
    Noll, J
    QSIC 2005: FIFTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, PROCEEDINGS, 2005, : 365 - 372
  • [7] Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions
    Gupta, Ankur
    Awasthi, Lalit K.
    CONTEMPORARY COMPUTING, PROCEEDINGS, 2009, 40 : 422 - +
  • [8] Mobility helps peer-to-peer security
    Capkun, S
    Hubaux, JP
    Buttyán, L
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006, 5 (01) : 43 - 51
  • [9] Security issues in peer-to-peer systems
    Thatipelli, S
    Moharrum, M
    Mukkamala, R
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XVI, PROCEEDINGS: SYSTEMICS AND INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATION, 2003, : 114 - 119
  • [10] A survey of peer-to-peer security issues
    Wallach, DS
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 42 - 57