Modelling inter-organizational workflow security in a peer-to-peer environment

被引:0
|
作者
Hafner, M [1 ]
Breu, M [1 ]
Breu, R [1 ]
Nowak, A [1 ]
机构
[1] Univ Innsbruck, Inst Informat, A-6020 Innsbruck, Austria
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The many conflicting technical, organizational, legal and domain-level constraints make the implementation of secure, inter-organizational workflows a very complex task, which is bound to low-level technical knowledge and error prone. The SECTINO project provides a framework for the realization and the high-level management of security-critical workflows based on the paradigm of Model Driven Security. In our case the models are translated into runtime artefacts that configure a target reference architecture based on web services technologies. In this paper we focus on the Global Workflow Model, which captures the message exchange protocol between partners cooperating in a distributed environments well as basic security patterns. We show how the model maps to workflow and security components of the hosting environments at the partner nodes.
引用
收藏
页码:533 / 540
页数:8
相关论文
共 50 条
  • [21] An evaluation of the security of the Bitcoin Peer-to-Peer Network
    Tapsell, James
    Akram, Raja Naeem
    Markantonakis, Konstantinos
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1057 - 1062
  • [22] Grid security: Lessons for peer-to-peer systems
    Surridge, M
    Upstill, C
    THIRD INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P2003), PROCEEDINGS, 2003, : 2 - 6
  • [23] On the security of polling protocols in peer-to-peer systems
    Sieka, B
    Kshemkalyani, AD
    Singhal, M
    FOURTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2004, : 36 - 44
  • [24] Execution environment of peer-to-peer services in a mobile environment
    Iwao, T
    Okada, M
    Kawashima, K
    Matsumura, S
    Kanda, H
    Sakamoto, S
    Kainuma, T
    Amamiya, M
    AGENTS AND PEER-TO-PEER COMPUTING, 2003, 2530 : 33 - 44
  • [25] A peer-to-peer virtual office for organizational knowledge management
    Le Coche, Enrico
    Mastroianni, Carlo
    Pirro, Giuseppe
    Ruffolo, Massimo
    Talia, Domenico
    PRACTICAL ASPECTS OF KNOWLEDGE MANAGEMENT, PROCEEDINGS, 2006, 4333 : 166 - +
  • [26] Epidemiological modelling of peer-to-peer viruses and pollution
    Thommes, Richard
    Coates, Mark
    25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 181 - 192
  • [27] Modelling for a federated peer-to-peer MMOG architecture
    Wu, Z.D.
    International Journal of Computers and Applications, 2008, 30 (04) : 309 - 318
  • [28] Interoperable conversations in a peer-to-peer learning environment
    Peng, EOC
    Othman, H
    Ching, DLS
    Sun, DWK
    Del Vecchio, D
    Kheng, LS
    INTERNATIONAL CONFERENCE ON COMPUTERS IN EDUCATION, VOLS I AND II, PROCEEDINGS, 2002, : 302 - 303
  • [29] Collaborative Development Environment in Peer-to-Peer Networks
    Thodi, Martin
    Fujita, Satoshi
    2016 FOURTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2016, : 586 - 589
  • [30] Efficient trust model for peer-to-peer environment
    Liu, Zheng
    Zhang, Qian
    Wen, Xue-Zhi
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2007, 28 (05): : 656 - 659