Back to Search Start Over

Chinese wall security for decentralized workflow management systems.

Authors :
Atluri, Vijayalakshmi
Soon Ae Chun
Mazzoleni, Pietro
Source :
Journal of Computer Security. 2004, Vol. 12 Issue 6, p799-840. 42p.
Publication Year :
2004

Abstract

Workflow systems are gaining importance as an infrastructure for automating inter‐organizational interactions, such as those in Electronic Commerce. In such an environment, a centralized Workflow Management System is not desirable because: (i) it can be a performance bottleneck, and (ii) the systems are inherently distributed, heterogeneous, and autonomous in nature. Decentralized execution of inter‐organizational workflows may raise a number of security issues including those related to conflict‐of‐interest among competing organizations. In this paper, we first provide an approach to realize decentralized workflow execution, in which the workflow is divided into partitions, called self‐describing workflows, and handled by a light weight workflow management component, called workflow stub, located at each organizational agent. Second, we identify the limitations of the traditional workflow model with respect to expressing the various types of join dependencies and extend the traditional workflow model suitably. Distinguishing the different types of dependencies among tasks is essential in the efficient execution of self‐describing workflows. Finally, we recognize that placing the task execution agents that belong to the same conflict‐of‐interest class in one self‐describing workflow may lead to unfair, and in some cases, undesirable results, akin to being on the wrong side of the Chinese wall. Therefore, to address the conflict‐of‐interest issues that arise in competitive business environments, we propose a decentralized workflow Chinese wall security model. We propose a restrictive partitioning solution to enforce the proposed model. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
0926227X
Volume :
12
Issue :
6
Database :
Academic Search Index
Journal :
Journal of Computer Security
Publication Type :
Academic Journal
Accession number :
15344761
Full Text :
https://doi.org/10.3233/JCS-2004-12601