Alter-egos and Roles — Supporting Workflow Security in Cyberspace

Gudes, van de Riet, Burg, and Olivier

1998

Citation information

E. Gudes, R. P. van de Riet, H. F. M. Burg, and M. S. Olivier. Alter-egos and roles — supporting workflow security in cyberspace. In T. Y. Lin and S. Qian, editors, Database Security XI: Status and Prospects, pages 182–195. Chapman & Hall, 1998

Abstract

Workflow Management (WFM) Systems automate traditional processes where information flows between individuals. WFM systems have two major implications for security. Firstly, since the description of a workflow process explicitly states when which function is to be performed by whom, security specifications may be automatically derived from such descriptions. Secondly, the derived security specifications have to be enforced. This paper considers these issues for a Cyberspace workflow system by describing a small, but comprehensive example.

The notion of an Alter-ego is central in this description: Alter-egos are objects that represent individuals in Cyberspace (and not merely identify them). In Cyberspace, documents in a workflow system therefore flow between Alter-egos, rather than between individuals.

Full text

A pre- or postprint of the publication is available at http://mo.co.za/ask/altego.pdf.
Note that a username and password are required to download the full text. (Why?)Please e-mail me and I will send you a username and password.

BibTeX reference

@INPROCEEDINGS(altego,
AUTHOR={Ehud Gudes and van de Riet, Reind P and Hans F M Burg and Martin S Olivier},
TITLE={Alter-egos and Roles --- Supporting Workflow Security in Cyberspace},
EDITOR={T Y Lin and Shelly Qian},
BOOKTITLE={Database Security XI: Status and Prospects},
PAGES={182--195},
PUBLISHER={Chapman & Hall},
YEAR={1998} )


[Publications] [Home]
Page maintained by Martin Olivier
Record refreshed: January 16, 2018

Beta version of new bibliography database; please report errors (or copyright violations) that may have slipped in.