Abstract
When companies interchange information about individuals, privacy is at stake. On the basis of the purpose of the information interchange, rules can be designed for an agent (Alter-ego) to determine whether the requested information can be provided. This purpose can be derived from a WorkFlow specification according to which employees (agents) of one company are executing their tasks. Direct information flow as well as information which might flow through private and covert channels is considered.
Chapter PDF
7. References
V. Atluri and W-K. Huang. An extended petri net model for supporting workflows in a multilevel secure environment. In Proceedings of the 10th IFIP WG 11.3 Working conference on Database Security, pages 199–216, July 1996.
J.F.M. Burg. Linguistic Instruments in Requirements Engineering. PhD thesis, Department of Mathematics and Computer Science, Vrije Universiteit Amsterdam, 1996.
S.C. Dik. The Structure of the Clause, volume 1 of The Theory of Functional Grammar. Floris Publications, Dordrecht, 1989.
C. Fellbaum, editor. WordNet: An Electronic Lexical Database. MIT Press, Cambridge, MA, 1998.
D. Georgakopoulos, M. Homick, and A. Sheth. An overview of workflow management: from process modelling to workflow automation infrastructure. Distributed and Parallel Databases, 3(2): 119–154, 1995.
E. Gudes, R.P. van de Riet, J.F.M. Burg, and M.S. Olivier. Alter-egos and roles — supporting workflow security in cyberspace. In Proceedings of the IFIP WG 11.3 Database Security Conference (DBSec’97), Lake Tahoe, USA, 1997.
Wouter Teepe. Privacy-gerichte workflow analyse. Master’s thesis, Rijksuniversiteit Groningen, 1999.
R.P. van de Riet and J.F.M. Burg. Linguistic tools for modelling alter egos in cyberspace: Who is responsible? Journal of Universal Computer Science, 2(9):623–636, 1996.
R.P. van de Riet and J.F.M. Burg. Modelling alter egos in cyberspace: Who is. responsible? In Proceedings of the World Conference of the Web Society (WebNet’96). AACE, 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Kluwer Academic Publishers
About this chapter
Cite this chapter
Teepe, W., van de Riet, R., Olivier, M. (2002). WorkFlow Analyzed for Security and Privacy in using Databases. In: Thuraisingham, B., van de Riet, R., Dittrich, K.R., Tari, Z. (eds) Data and Application Security. IFIP International Federation for Information Processing, vol 73. Springer, Boston, MA. https://doi.org/10.1007/0-306-47008-X_24
Download citation
DOI: https://doi.org/10.1007/0-306-47008-X_24
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-7923-7514-2
Online ISBN: 978-0-306-47008-0
eBook Packages: Springer Book Archive