W. Teepe, R. P. van de Riet, and M. S. Olivier. “WorkFlow Analyzed for Security and Privacy in using Databases”. In: Data and Applications Security — Developments and Directions. Ed. by B. Thuraisingham et al. Also published as a journal paper Teepe, van de Riet, and Olivier, “WorkFlow Analyzed for Security and Privacy in using Databases”. Kluwer, 2001, pp. 271–282
When companies interchange information about individuals, privacy is at stake. On the basis of the purpose of the information interchange, rules can be designed for an agent (Alter-ego) to determine whether the requested information can be provided. This purpose can be derived from a WorkFlow specification according to which employees (agents) of one company are executing their tasks. Direct information flow as well as information which might flow through private and covert channels is considered.
A pre- or postprint of the publication is available at https://mo.co.za/ask/wfanl.pdf.
Note that a username and password are required to download the full text.
(Why?)Please e-mail me and I will send you a username and password.
The definitive version of the paper is available from the publisher.
DOI: 10.1007/0-306-47008-X_24
@inproceedings(wfanl,
author={Wouter Teepe and van de Riet, Reind P and Martin S
Olivier},
title={WorkFlow Analyzed for Security and Privacy in using
Databases},
editor={Bhavani Thuraisingham and Reind P van de Riet and Klaus R
Dittrich and Zahir Tari},
booktitle={Data and Applications Security --- Developments and
Directions},
pages={271--282},
publisher={Kluwer},
year={2001},
note={Also published as a journal paper ∖cite{wfanl2}} )
[Publications] [Home]
Page maintained by Martin Olivier
Record refreshed: October 31, 2019