Back to Search
Start Over
Security-enabled Enactment of Decentralized Workflows
- Source :
- SIN
- Publication Year :
- 2016
- Publisher :
- ACM, 2016.
-
Abstract
- Decentralized enactment of workflows is generally advocated for data intensive scientific applications. This approach offers a number of advantages including avoiding a single (centralized) point of failure, and associated (centralized) performance bottlenecks. However, such services are often assumed to be openly available with little or no security. This is increasingly not the case. Instead organizations and the services they offer require autonomous ways of defining and enforcing their own access control policies supporting fine-grained authorization. Tackling such scenarios raises many issues regarding workflow definition, enactment and potential re-enactment. This research explores the issues related to security-oriented decentralized workflow definition and enactment. The solution is respectful of the need for autonomy of service providers and allows each participating service to define their own access control policies. We also show how different security delivery models can be supported leveraging the pulling and pushing of security credentials.
- Subjects :
- Service (systems architecture)
Computer science
business.industry
media_common.quotation_subject
Authorization
020206 networking & telecommunications
Access control
02 engineering and technology
Service provider
Computer security
computer.software_genre
Workflow
0202 electrical engineering, electronic engineering, information engineering
Information system
020201 artificial intelligence & image processing
business
computer
Autonomy
media_common
Subjects
Details
- Database :
- OpenAIRE
- Journal :
- Proceedings of the 9th International Conference on Security of Information and Networks
- Accession number :
- edsair.doi...........c139a1c7c5c5a88f7831c66e77bb321a
- Full Text :
- https://doi.org/10.1145/2947626.2951957