WorkFlow Analyzed for Security and Privacy in using Databases

  • Wouter Teepe
  • Reind van de Riet
  • Martin Olivier
Chapter
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 73)

Abstract

When companies interchange information about individuals, privacy is at stake. On the basis of the purpose of the information interchange, rules can be designed for an agent (Alter-ego) to determine whether the requested information can be provided. This purpose can be derived from a WorkFlow specification according to which employees (agents) of one company are executing their tasks. Direct information flow as well as information which might flow through private and covert channels is considered.

Key words

Security & Privacy and Database systems Workflow Cyberspace Object-Oriented Databases 

7. References

  1. [AH96]
    V. Atluri and W-K. Huang. An extended petri net model for supporting workflows in a multilevel secure environment. In Proceedings of the 10th IFIP WG 11.3 Working conference on Database Security, pages 199–216, July 1996.Google Scholar
  2. [Bur96]
    J.F.M. Burg. Linguistic Instruments in Requirements Engineering. PhD thesis, Department of Mathematics and Computer Science, Vrije Universiteit Amsterdam, 1996.Google Scholar
  3. [Dik89]
    S.C. Dik. The Structure of the Clause, volume 1 of The Theory of Functional Grammar. Floris Publications, Dordrecht, 1989.Google Scholar
  4. [Fel98]
    C. Fellbaum, editor. WordNet: An Electronic Lexical Database. MIT Press, Cambridge, MA, 1998.Google Scholar
  5. [GHS95]
    D. Georgakopoulos, M. Homick, and A. Sheth. An overview of workflow management: from process modelling to workflow automation infrastructure. Distributed and Parallel Databases, 3(2): 119–154, 1995.CrossRefGoogle Scholar
  6. [GRBO97]
    E. Gudes, R.P. van de Riet, J.F.M. Burg, and M.S. Olivier. Alter-egos and roles — supporting workflow security in cyberspace. In Proceedings of the IFIP WG 11.3 Database Security Conference (DBSec’97), Lake Tahoe, USA, 1997.Google Scholar
  7. [Tee99]
    Wouter Teepe. Privacy-gerichte workflow analyse. Master’s thesis, Rijksuniversiteit Groningen, 1999.Google Scholar
  8. [vdRB96a]
    R.P. van de Riet and J.F.M. Burg. Linguistic tools for modelling alter egos in cyberspace: Who is responsible? Journal of Universal Computer Science, 2(9):623–636, 1996.Google Scholar
  9. [vdRB96b]
    R.P. van de Riet and J.F.M. Burg. Modelling alter egos in cyberspace: Who is. responsible? In Proceedings of the World Conference of the Web Society (WebNet’96). AACE, 1996.Google Scholar

Copyright information

© Kluwer Academic Publishers 2002

Authors and Affiliations

  • Wouter Teepe
    • 1
  • Reind van de Riet
    • 2
  • Martin Olivier
    • 3
  1. 1.Department of Artificial IntelligenceState University of GroningenGroningenThe Netherlands
  2. 2.Department of Mathematics and Computer ScienceVrije UniversiteitAmsterdamThe Netherlands
  3. 3.Department of Mathematics and Computer ScienceRand UniversityJohannesburgSouth Africa

Personalised recommendations