WorkFlow Analyzed for Security and Privacy in using Databases

Teepe, van de Riet, and Olivier

2001

Citation information

W. Teepe, R. P. van de Riet, and M. S. Olivier. “WorkFlow Analyzed for Security and Privacy in using Databases”. In: Data and Applications Security — Developments and Directions. Ed. by B. Thuraisingham et al. Also published as a journal paper Teepe, van de Riet, and Olivier, “WorkFlow Analyzed for Security and Privacy in using Databases”. Kluwer, 2001, pp. 271–282

Abstract

When companies interchange information about individuals, privacy is at stake. On the basis of the purpose of the information interchange, rules can be designed for an agent (Alter-ego) to determine whether the requested information can be provided. This purpose can be derived from a WorkFlow specification according to which employees (agents) of one company are executing their tasks. Direct information flow as well as information which might flow through private and covert channels is considered.

Full text

A pre- or postprint of the publication is available at https://mo.co.za/ask/wfanl.pdf.
Note that a username and password are required to download the full text. (Why?)Please e-mail me and I will send you a username and password.

BibTeX reference

@inproceedings(wfanl,
author={Wouter Teepe and van de Riet, Reind P and Martin S Olivier},
title={WorkFlow Analyzed for Security and Privacy in using Databases},
editor={Bhavani Thuraisingham and Reind P van de Riet and Klaus R Dittrich and Zahir Tari},
booktitle={Data and Applications Security --- Developments and Directions},
pages={271--282},
publisher={Kluwer},
year={2001},
note={Also published as a journal paper cite{wfanl2}} )


[Publications] [Home]
Page maintained by Martin Olivier
Record refreshed: March 21, 2019

Beta version of new bibliography database; please report errors (or copyright violations) that may have slipped in.