Skip to main content

Securing Collaborative Networks: Requirements of Supporting Secured Collaborative Processes

  • Conference paper
  • First Online:
Collaborative Networks in Digitalization and Society 5.0 (PRO-VE 2023)

Part of the book series: IFIP Advances in Information and Communication Technology ((IFIPAICT,volume 688))

Included in the following conference series:

  • 533 Accesses

Abstract

The shift towards Industry 5.0 and Society 5.0 highlights the need for human-centric systems that balance automation with societal well-being. However, this must be achieved in a constantly evolving security landscape that emphasizes security by design. Furthermore, disruptive events are becoming more frequent, demanding systems with advanced transformative resilience and antifragility. Collaborative ecosystems that can improve and adapt throughout a sequence of attacks and disruptions are essential. Privacy regulations such as GDPR have also imposed strict requirements on the usage and security of personal data. To address these challenges, we investigate the security requirements for supporting collaborative processes across different systems and illustrate them using a specific collaborative process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. European Union. Regulation 2016/679 (General Data Protection Regulation). Official Journal of the European Union 59, 1–88 (2016)

    Google Scholar 

  2. Ferraiolo, D., Kuhn, R.: Role-based access control. In: 15th NIST-NCSC National Computer Security Conference, pp. 554–563 (1992)

    Google Scholar 

  3. Hu, V.C., Ferraiolo, D., Kuhn, R., et al.: Guide to attribute based access control (ABAC) definition and considerations. NIST Special Publication 800:162 (2014). https://doi.org/10.6028/NIST.SP.800-162

  4. Thomas, R.K., Sandhu, R.S.: Towards a task-based paradigm for flexible and adaptable access control in distributed applications. In: Proceedings on the 1992-1993 Workshop on New Security Paradigms, pp. 138–142. ACM, New York (1993)

    Google Scholar 

  5. Thomas, R.K., Sandhu, R.S.: Conceptual foundations for a model of task-based authorisations. In: Proceedings the Computer Security Foundations Workshop VII, Franconia, NH, pp. 66–79. IEEE Computer Society (1994)

    Google Scholar 

  6. Thomas, R.K., Sandhu, R.S.: Task-based authorisation controls (TBAC): a family of models for active and enterprise-oriented authorisation management. In: Lin, T.Y., Qian, S. (eds.) Database Security XI: Status and Prospects, pp. 166–181. Springer, Boston (1998). https://doi.org/10.1007/978-0-387-35285-5_10

    Chapter  Google Scholar 

  7. Thomas, R., Sandhu, R., Das, S.: Task-Based Authorisations, Ithaca, NY (1999)

    Google Scholar 

  8. Oh, S., Park, S.: Task–role-based access control model. Inf. Syst. 28, 533–562 (2003). https://doi.org/10.1016/S0306-4379(02)00029-7

    Article  MATH  Google Scholar 

  9. Leitner, M., Rinderle-Ma, S.: A systematic review on security in process-aware information systems – constitution, challenges, and future directions. Inf. Softw. Technol. 56(3), 273–293 (2014). https://doi.org/10.1016/j.infsof.2013.12.004

    Article  Google Scholar 

  10. Thomas, R.K., Sandhu, R.S.: Towards a task-based paradigm for flexible and adaptable access control in distributed applications. In: Proceedings New Security Paradigms Workshop, pp. 138–142 (1993)

    Google Scholar 

  11. Jones, M., Hardt, D.: The OAuth 2.0 Authorisation Framework: Bearer Token Usage [RFC 6750] (2012)

    Google Scholar 

  12. Jin, X., Krishnan, R., Sandhu, R.: A unified attribute-based access control model covering DAC, MAC and RBAC. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) Data and Applications Security and Privacy XXVI, pp. 41–55. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31540-4_4

    Chapter  Google Scholar 

  13. Sandhu, R.: The authorisation leap from rights to attributes: maturation or chaos? In: Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT, pp. 69–70 (2012). https://doi.org/10.1145/2295136.2295150

  14. Schefer-Wenzl, S., Strembeck, M.: Model-driven specification and enforcement of RBAC break-glass policies for process-aware information systems. Inf. Softw. Technol. 56, 1289–1308 (2014). https://doi.org/10.1016/j.infsof.2014.04.010

    Article  Google Scholar 

  15. Lu, Y., Zhang, L., Sun, J.: Task-activity based access control for process collaboration environments. Comput. Ind. 60(6), 403–415 (2009). https://doi.org/10.1016/j.compind.2009.02.009

    Article  Google Scholar 

  16. Jordan, D., Evdemon, J., Alves, A., et al.: Web services business process execution language version 2.0 (OASIS standard). WS-BPEL, pp. 1–264 (2007)

    Google Scholar 

  17. OMG. Business Process Model and Notation (BPMN) Version 2.0. Business 50:170 (2011). https://doi.org/10.1007/s11576-008-0096-z

  18. Parducci, B., Lockhart, H.: eXtensible Access Control Markup Language (XACML) Version 3.0 (2013)

    Google Scholar 

  19. Sakimura, N., Bradley, J., Jones, M., et al.: OpenID Connect Core 1.0 (2014)

    Google Scholar 

  20. Maler, E., Machulak, M., Richer, J., Hardjono, T.: User-Managed Access (UMA) 2.0 Grant for OAuth 2.0 Authorisation. Network Working Group (2019). https://tools.ietf.org/html/draft-maler-oauth-umagrant-00

  21. Maler, E., Machulak, M., Richer, J., Hardjono, T.: Federated Authorisation for User-Managed Access UMA‚ 2.0. Network Working Group (2019) https://datatracker.ietf.org/doc/html/draft-maler-oauth-umafedauthz-00. Accessed 7 July 2021

  22. Lockhart, H., Campbell, B., Ragouzis, N., et al.: SAML v2.0 Technical Overview (2005)

    Google Scholar 

  23. He, R., Yuan, M., Hu, J., et al.: A novel service-oriented AAA architecture. In: 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, PIMRC 2003, pp. 2833–2837. IEEE (2003)

    Google Scholar 

  24. Gommans, L., Travostino, F., Vollbrecht, J., et al.: Token-based authorisation of connection oriented network resources. In: GRIDNETS Conference Proceedings. System and Network Engineering (IVI, FNWI), Amsterdam (2004)

    Google Scholar 

  25. Chatterjee, A., Prinz, A.: Applying spring security framework with KeyCloak-based OAuth2 to protect microservice architecture APIs: a case study. Sensors 22, 1703 (2022). https://doi.org/10.3390/s22051703

    Article  Google Scholar 

  26. Politze, M.: A reference architecture and implementation enabling data protection in distributed learning and science processes. RWTH Aachen University (2019)

    Google Scholar 

  27. Politze, M., Decker, B.: Extending the OAuth2 workflow to audit data usage for users and service providers in a cooperative scenario. In: 10. DFN-Forum Kommunikationstechnologien. Gesellschaft für Informatik eV

    Google Scholar 

  28. Schäffer, E., Schobert, M., Reichenstein, T., et al.: Reference architecture and agile development method for a process-driven web platform based on the BPMN-standard and process engines. Procedia CIRP 103, 146–151 (2021). https://doi.org/10.1016/j.procir.2021.10.023

    Article  Google Scholar 

  29. Karadimas, D., Panagiotou, C., Gialelis, J., et al.: Process based machine learning for energy optimization in industrial enterprises. In: 2021 10th Mediterranean Conference on Embedded Computing (MECO), pp. 1–4. IEEE (2021)

    Google Scholar 

  30. Suzic, B.: Securing integration of cloud services in cross-domain distributed environments. In: Proceedings of the 31st Annual ACM Symposium on Applied Computing, pp. 398–405. ACM, New York (2016)

    Google Scholar 

  31. Suzic, B.: User-centered security management of API-based data integration workflows. In: 2016 IEEE/IFIP Network Operations and Management Symposium, NOMS 2016, pp. 1233–1238. IEEE (2016)

    Google Scholar 

  32. Tolone, W., Ahn, G.-J., Pai, T., Hong, S.-P.: Access control in collaborative systems. ACM Comput. Surv. 37, 29–41 (2005). https://doi.org/10.1145/1057977.1057979

    Article  Google Scholar 

  33. Saltzer, J.H.: Protection and control of information sharing in Multics. In: Proceedings of the 4th ACM Symposium on Operating Systems Principles, SOSP 1973, p. 119 (1973)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Paul de Vrieze .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

de Vrieze, P., Xu, L. (2023). Securing Collaborative Networks: Requirements of Supporting Secured Collaborative Processes. In: Camarinha-Matos, L.M., Boucher, X., Ortiz, A. (eds) Collaborative Networks in Digitalization and Society 5.0. PRO-VE 2023. IFIP Advances in Information and Communication Technology, vol 688. Springer, Cham. https://doi.org/10.1007/978-3-031-42622-3_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-42622-3_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-42621-6

  • Online ISBN: 978-3-031-42622-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics