Controlling Usage in Business Process Workflows through Fine-Grained Security Policies (Contributo in atti di convegno)

Type
Label
  • Controlling Usage in Business Process Workflows through Fine-Grained Security Policies (Contributo in atti di convegno) (literal)
Anno
  • 2008-01-01T00:00:00+01:00 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
  • 10.1007/978-3-540-85735-8_11 (literal)
Alternative label
  • [1] Martinelli F., [1] Matteucci I., [1] Mori P., [2] Aziz B., [2] Arenas A. (2008)
    Controlling Usage in Business Process Workflows through Fine-Grained Security Policies
    in 5th international conference on Trust, Privacy and Security in Digital Business (TrustBus '08), Turin, ITALY, 4-5 September 2008
    (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
  • [1] Martinelli F., [1] Matteucci I., [1] Mori P., [2] Aziz B., [2] Arenas A. (literal)
Pagina inizio
  • 100 (literal)
Pagina fine
  • 117 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#url
  • http://link.springer.com/chapter/10.1007%2F978-3-540-85735-8_11 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#titoloVolume
  • Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#volumeInCollana
  • 5185 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#pagineTotali
  • 18 (literal)
Note
  • ISI Web of Science (WOS) (literal)
  • SpringerL (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
  • [1] CNR-IIT, Pisa, Italy; [2]STFC Rutherford Appleton Laboratory, Didcot, UK (literal)
Titolo
  • Controlling Usage in Business Process Workflows through Fine-Grained Security Policies (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#isbn
  • 978-3-540-85734-1 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autoriVolume
  • Steven Furnel, Sokratis K. Katsikas, Antonio Lioy (literal)
Abstract
  • We propose a language for expressing fine-grained security policies for controlling orchestrated business processes modelled as a BPEL workflow. Our policies are expressed as a process algebra that permits a BPEL activity, denies it or force-terminates it. The outcome is evaluates with compensation contexts. Finally, we give an example of these policies in a distributed map processing scenario such that the policies constrain service interactions in the workflow according to the security requirements of each entity participating in the workflow. (literal)
Editore
Prodotto di
Autore CNR
Insieme di parole chiave

Incoming links:


Prodotto
Autore CNR di
Editore di
Insieme di parole chiave di
data.CNR.it