“WorkFlow Analyzed for Security and Privacy in using Databases”

Teepe, van de Riet, and Olivier

2001

Citation information

W. Teepe, R. P. van de Riet, and M. S. Olivier. “WorkFlow Analyzed for Security and Privacy in using Databases”. In: Data and Applications Security — Developments and Directions. Ed. by B. Thuraisingham et al. Also published as a journal paper [7]. Kluwer, 2001, pp. 271–282

Abstract

When companies interchange information about individuals, privacy is at stake. On the basis of the purpose of the information interchange, rules can be designed for an agent (Alter-ego) to determine whether the requested information can be provided. This purpose can be derived from a WorkFlow specification according to which employees (agents) of one company are executing their tasks. Direct information flow as well as information which might flow through private and covert channels is considered.

Full text

A pre- or postprint of the publication is available at http://mo.co.za/ask/wfanl.pdf.
Note that a username and password are required to download the full text. (Why?) Please e-mail me and I will send you a username and password.

BibTeX reference

@INPROCEEDINGS(wfanl,
AUTHOR={Wouter Teepe and van de Riet, Reind P and Martin S Olivier},
TITLE={WorkFlow Analyzed for Security and Privacy in using Databases},
EDITOR={Bhavani Thuraisingham and Reind P van de Riet and Klaus R Dittrich and Zahir Tari},
BOOKTITLE={Data and Applications Security --- Developments and Directions},
PAGES={271--282},
PUBLISHER={Kluwer},
YEAR={2001},
NOTE={Also published as a journal paper \cite{wfanl2}} )


[Publications] [Home]
Page maintained by Martin Olivier
Database updated: November 8, 2015

Beta version of new bibliography database; please report errors (or copyright violations) that may have slipped in.