By Topic

Modelling inter-organizational workflow security in a peer-to-peer environment

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
M. Hafner ; Inst. fur Informatik, Innsbruck Univ., Austria ; M. Breu ; R. Breu ; A. Nowak

The many conflicting technical, organizational, legal and domain-level constraints make the implementation of secure, inter-organizational workflows a very complex task, which is bound to low-level technical knowledge and error prone. The SECTINO project provides a framework for the realization and the high-level management of security-critical workflows based on the paradigm of model driven security. In our case the models are translated into runtime artefacts that configure a target reference architecture based on Web services technologies. In this paper we focus on the global workflow model, which captures the message exchange protocol between partners cooperating in a distributed environments well as basic security patterns. We show how the model maps to workflow and security components of the hosting environments at the partner nodes.

Published in:

IEEE International Conference on Web Services (ICWS'05)

Date of Conference:

11-15 July 2005