http://www.cnr.it/ontology/cnr/individuo/prodotto/ID83657
Controlling Usage in Business Process Workflows through Fine-Grained Security Policies (Contributo in atti di convegno)
- Type
- Label
- Controlling Usage in Business Process Workflows through Fine-Grained Security Policies (Contributo in atti di convegno) (literal)
- Anno
- 2008-01-01T00:00:00+01:00 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
- 10.1007/978-3-540-85735-8_11 (literal)
- Alternative label
[1] Martinelli F., [1] Matteucci I., [1] Mori P., [2] Aziz B., [2] Arenas A. (2008)
Controlling Usage in Business Process Workflows through Fine-Grained Security Policies
in 5th international conference on Trust, Privacy and Security in Digital Business (TrustBus '08), Turin, ITALY, 4-5 September 2008
(literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
- [1] Martinelli F., [1] Matteucci I., [1] Mori P., [2] Aziz B., [2] Arenas A. (literal)
- Pagina inizio
- Pagina fine
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#url
- http://link.springer.com/chapter/10.1007%2F978-3-540-85735-8_11 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#titoloVolume
- Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#volumeInCollana
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#pagineTotali
- Note
- ISI Web of Science (WOS) (literal)
- SpringerL (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
- [1] CNR-IIT, Pisa, Italy; [2]STFC Rutherford Appleton Laboratory, Didcot, UK (literal)
- Titolo
- Controlling Usage in Business Process Workflows through Fine-Grained Security Policies (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#isbn
- 978-3-540-85734-1 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autoriVolume
- Steven Furnel, Sokratis K. Katsikas, Antonio Lioy (literal)
- Abstract
- We propose a language for expressing fine-grained security policies for controlling orchestrated business processes modelled as a BPEL workflow. Our policies are expressed as a process algebra that permits a BPEL activity, denies it or force-terminates it. The outcome is evaluates with compensation contexts. Finally, we give an example of these policies in a distributed map processing scenario such that the policies constrain service interactions in the workflow according to the security requirements of each entity participating in the workflow. (literal)
- Editore
- Prodotto di
- Autore CNR
- Insieme di parole chiave
Incoming links:
- Prodotto
- Autore CNR di
- Editore di
- Insieme di parole chiave di