WorkFlow Analyzed for Security and Privacy in using Databases

Teepe, van de Riet, and Olivier


Citation information

W. Teepe, R. P. van de Riet, and M. S. Olivier. Workflow analyzed for security and privacy in using databases. In B. Thuraisingham, R. P. van de Riet, K. R. Dittrich, and Z. Tari, editors, Data and Applications Security — Developments and Directions, pages 271–282. Kluwer, 2001. Also published as a journal paper Teepe et al. [2003]


When companies interchange information about individuals, privacy is at stake. On the basis of the purpose of the information interchange, rules can be designed for an agent (Alter-ego) to determine whether the requested information can be provided. This purpose can be derived from a WorkFlow specification according to which employees (agents) of one company are executing their tasks. Direct information flow as well as information which might flow through private and covert channels is considered.

Full text

A pre- or postprint of the publication is available at
Note that a username and password are required to download the full text. (Why?)Please e-mail me and I will send you a username and password.

BibTeX reference

AUTHOR={Wouter Teepe and van de Riet, Reind P and Martin S Olivier},
TITLE={WorkFlow Analyzed for Security and Privacy in using Databases},
EDITOR={Bhavani Thuraisingham and Reind P van de Riet and Klaus R Dittrich and Zahir Tari},
BOOKTITLE={Data and Applications Security --- Developments and Directions},
NOTE={Also published as a journal paper cite{wfanl2}} )

[Publications] [Home]
Page maintained by Martin Olivier
Record refreshed: January 16, 2018

Beta version of new bibliography database; please report errors (or copyright violations) that may have slipped in.