WorkFlow Analyzed for Security and Privacy in using Databases
Teepe, van de Riet, and Olivier
2001
Citation information
W. Teepe, R. P. van de Riet, and M. S. Olivier. “WorkFlow Analyzed for Security and Privacy in using Databases”. In: Data and Applications Security — Developments and Directions. Ed. by B. Thuraisingham, R. P. van de Riet, K. R. Dittrich, and Z. Tari. Also published as a journal paper Teepe, van de Riet, and Olivier, “WorkFlow Analyzed for Security and Privacy in using Databases”. Kluwer, 2001, pp. 271–282Abstract
When companies interchange information about individuals, privacy is at stake. On the basis of the purpose of the information interchange, rules can be designed for an agent (Alter-ego) to determine whether the requested information can be provided. This purpose can be derived from a WorkFlow specification according to which employees (agents) of one company are executing their tasks. Direct information flow as well as information which might flow through private and covert channels is considered.
Full text
A pre- or postprint of the publication is available at https://mo.co.za/ask/wfanl.pdf.Note that a username and password are required to download the full text. (Why?) Please e-mail me and I will send you a username and password.
Definitive version
The definitive version of the paper is available from the publisher.DOI: 10.1007/0-306-47008-X_24
BibTeX reference
@inproceedings(wfanl,author={Wouter Teepe and van de Riet, Reind P and Martin S Olivier},
title={WorkFlow Analyzed for Security and Privacy in using Databases},
editor={Bhavani Thuraisingham and Reind P van de Riet and Klaus R Dittrich and Zahir Tari},
booktitle={Data and Applications Security --- Developments and Directions},
pages={271--282},
publisher={Kluwer},
year={2001},
note={Also published as a journal paper ∖cite{wfanl2}} )