By Topic

Idea to derive security policies from collaborative business processes

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Ji Hu ; SAP Research CEC, Karlsruhe, Germany

Collaborative business processes often consist of services provided by multiple business entities which agree to join a business collaboration. To enable trustworthy and secure consumption and provisioning of services across organizational boundaries, security requirements must be carefully defined so as to be coherent, consistent, and in compliance with designed business processes. However, managing security requirements in collaborative environments is error-prone, effort inefficient, and hard to be verified. This paper introduces our ongoing research effort for developing algorithms and methods to derive security policies from formally defined business process models. The derived policies serve as templates which can be later on complemented with concrete business entity data and finally turned into deployable policies.

Published in:

2009 13th Enterprise Distributed Object Computing Conference Workshops

Date of Conference:

1-4 Sept. 2009