Abstract
During eGovernment processes often sensitive data are worked on. The authorization to work on or pass data on should not only of security policy certainly, but also by the technology and/or Business Process support systems (BPS Systems) to be supported. HyPR&A, hybrid process-oriented role and task security model, is a model for eGovernment organizations, which support eGovernment processes. In this article HyPR&A is developed and adapted on basis of architecture for Workflow Enactment services for BPS System
Chapter PDF
Similar content being viewed by others
5. References
Atluri, V. and Chun, S.A., 2003, Handling Dynamic Changes in Decentralized Workflow Execution Environments, DEXA 2003 Proceedings: P. 813–825.
Atluri, V. and Huang W.-K., 1996, An Authorization Model for Workflows, Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security: P. 44–64.
Atluri, V., Huang W.-K. and Bertino, E., 1997, An Execution Model for Multilevel Seccure Workflows, Proceedings of the IFIP TC11 WG11.3: P. 151–165.
Botha, R.A.., 2001, CoSAWoE-A Model for Context-sensitive Access Control in Workflow Environments. Dissertation, Rand Afrikaans University i.Br.
Dridi, F., Muschall, B., Pernul, G., 2003, An Administration Console for the CSAP System. In: Short Paper Proceedings of the 15th Conference on Advanced Information Systems Engineering (CAiSE 2003): P.345–350.
Dridi, F., Muschall, B. and Pernul, G., 2004., Administration of an RBAC System. Proc.of the 37th Hawaiian International Conference on System Sciences (HICSS 2004):P. 1014–1026
Eckert, C, 2003, IT-Sicherheit. Oldenburg.
Fischer-Hübner, S., 2001, IT-Security and Privacy: Springer Berlin et al.
He, Q., 2003, Privacy Enforcement with an Extended Role-Based Access Control Model NCSU Computer Science Technical Report TR-2003-09.
Hung, P. C. K., Karlapalem K.: A secure workflow. Proceedings of the Australasian information security workshop conference on ACSW, 2003, V21: P. 33–41.
Pernul, G., 1992, Security Constraint Processing During Multilevel Secure Database Design, in Proceedings of Eighth Annual IEEE Computer Security Applications Conference,: P. 229–247.
NIST, 2002, The Economic Impact of Role Based Access Control. Research Triangle Institute. NIST Planning Report 02-01.
Podgayetskaya, T., Ratz, D. and Stucky, W., 2003, Modell eines Workflow-Systems zur Erhöhung der Sicherheit von Web Services, Proceedings E. Otner (Hrsg.) in Symposium Entwicklung Web-Services basierter Anwendungen. In Rahmen der 33. Jahrestagung der GI: P. 37–52.
Podgayetskaya, T., Stucky, W., 2004, A Model of Business Process Support System for E-Government. DEXA 2004 Proceedings. Published by the IEEE Computer Society, P2195: P.1007–1015.
Sandhu, R.S., Coyne, E. J., Feinstein, H.L. and Youman, C.E., 1996, Role-Based Access Control Models, IEEE Computer 29(2): P. 38–47.
Sandhu, R.S., Ferraiolo, D. F., Kuhn, D. R., 200, The NIST Model for Role Based Access Control: Towards a Unified Standard, Proceedings, 5th ACM Workshop on Role Based Access Control, P.26–37.
Schier, K., 1999, Vertraurenswürdige Kommunikation im elektronischen Zahlungsverkehr. Dissertation, Universität Hamburg i.Br.
Wainer, J., Barthelmess, P., and Kumar, A, 2003, W-RBAC-A Workflow Security Model Incorporating Controlled Overriding of Constraints. J of Coop. Inf. Sys.4,: P. 455–48.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this paper
Cite this paper
Podgayetskaya, T., Stucky, W. (2005). Hypr&A - A Security Model for the Support Processes in Egovernment. In: Funabashi, M., Grzech, A. (eds) Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government. IFIP International Federation for Information Processing, vol 189. Springer, Boston, MA. https://doi.org/10.1007/0-387-29773-1_15
Download citation
DOI: https://doi.org/10.1007/0-387-29773-1_15
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-28753-9
Online ISBN: 978-0-387-29773-6
eBook Packages: Computer ScienceComputer Science (R0)