SECTET: an extensible framework for the realization of secure inter-organizational workflows

被引:29
|
作者
Hafner, Michael [1 ]
Breu, Ruth
Agreiter, Berthold
Nowak, Andrea
机构
[1] Univ Innsbruck, Dept Informat, A-6020 Innsbruck, Austria
[2] Seibersdorf Res GmbH, Austrian Res Ctr, Seibersdorf, Austria
关键词
security products; work flow; workplace security;
D O I
10.1108/10662240610710978
中图分类号
F [经济];
学科分类号
02 ;
摘要
Purpose - This contribution aims to present the core components of a framework and illustrate the main concepts of a methodology for the systematic design and realization of security-critical inter-organizational workflows with a portion of a workflow-scenario drawn from e-government. It is additionally shown how the framework can be adapted to incorporate advanced security patterns like the Qualified Signature, which extends the concept of digital signature by requiring a natural person to sign. Design/methodology/approach - The framework is based on a methodology that focuses on the correct implementation of security-requirements and consists of a suite of tools that facilitates the cost-efficient realization and management of decentralized, security-critical workflows. Findings - The framework has been prototypically validated through case studies from the healthcare and e-government sector. Positive results in pilot applications with industrial partners encourage further steps: the set of supported security requirements is continuously extended (e.g. rights delegation, four eyes principle), a testing environment for industrial settings is being implemented, and the requirements for the efficient management of inter-organizational workflows are being analysed systematically. Practical implications - The framework caters to the needs of an industrial audience, in need of a cost-efficient support for the systematic and correct realization of secure, inter-organizational workflows. Originality/value - The contribution provides a description of the SECTET framework. It is shown how it can be adapted to incorporate advanced security patterns like the Qualified Signature, which implement a legal requirement specific to e-government.
引用
收藏
页码:491 / 506
页数:16
相关论文
共 50 条
  • [1] Systematic design and realization of security-critical inter-organizational workflows
    Breu, R
    Hafner, M
    Weber, B
    Nowak, A
    [J]. EADOPTION AND THE KNOWLEDGE ECONOMY: ISSUES, APPLICATIONS, CASE STUDIES, PTS 1 AND 2, 2004, 1 : 646 - 653
  • [2] Cooperation policies for inter-organizational workflows
    Chebbi, I
    Tata, S
    Dustdar, S
    [J]. 2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2005, : 222 - 225
  • [3] Soundness analysis of inter-organizational workflows
    College of Information Science and Engineering, Shandong University of Science and Technology, Qingdao 266510, China
    不详
    [J]. Inf. Technol. J., 2008, 8 (1194-1199):
  • [4] A decentralized execution model for inter-organizational workflows
    Vijayalakshmi Atluri
    Soon Ae Chun
    Ravi Mukkamala
    Pietro Mazzoleni
    [J]. Distributed and Parallel Databases, 2007, 22 : 55 - 83
  • [5] MODELING TIME CONSTRAINTS IN INTER-ORGANIZATIONAL WORKFLOWS
    Makni, Mouna
    Ben Hadj-Alouane, Nejib
    Yeddes, Moez
    Tata, Samir
    [J]. ICEIS 2010: PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL 3: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, 2010, : 221 - 229
  • [6] A decentralized execution model for inter-organizational workflows
    Atluri, Vijayalakshmi
    Chun, Soon Ae
    Mukkamala, Ravi
    Mazzoleni, Pietro
    [J]. DISTRIBUTED AND PARALLEL DATABASES, 2007, 22 (01) : 55 - 83
  • [7] Negotiating propagation of changes in inter-organizational workflows
    Donatelli, S
    Sarini, M
    Simone, C
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2000, 15 (05): : 359 - 372
  • [8] A tool for secure inter-organizational computing
    Kang, MH
    Froscher, JN
    [J]. PROCEEDINGS OF THE TENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, 2001, : 194 - 199
  • [9] Adaptation Patterns for Service Based Inter-Organizational Workflows
    Boukhedouma, Saida
    Oussalah, Mourad
    Aimazighi, Zaia
    Tamzalit, Dalila
    [J]. 2013 IEEE SEVENTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2013,
  • [10] Novel Access Control Approach for Inter-organizational Workflows
    El Kandoussi, Asmaa
    El Bakkali, Hanan
    [J]. ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 345 - 352