Security for Workflow Systems
نویسندگان
چکیده
Organizations constantly reengineer and optimize their business processes to reduce costs, deliver timely services, and enhance their competitive advantage in the market. Reengineering involves assessment, analysis, and redesign of business processes, including introducing new processes into existing systems, eliminating redundant processes, reallocating sharable resources, optimizing the process execution, among others. Business processes relate to tasks that create, access, process and manage business information throughout organizational information systems that include databases.
منابع مشابه
Formal Analysis of Workflow Systems with Security Considerations
Workflow systems play an essential role in today’s enterprises by providing automatic manipulation of business processes. As an integral part of workflow systems, workflow security has received extensive attentions, within which role-based access control (RBAC) mechanism and separation of duty (SoD) constraints are important topics. RBAC is a natural mechanism to lighten the complexity of secur...
متن کاملModeling, Specifying and Implementing Workflow Security in Cyberspace
Workflow Management (WFM) Systems automate traditional processes where information flows between individuals. WFM systems have two major implications for security. Firstly, since the description of a workflow process explicitly states when which function is to be performed by whom, security specifications may be automatically derived from such descriptions. Secondly, the derived security specif...
متن کاملRefactoring service-based systems: how to avoid trusting a workflow service
Grid systems span multiple organizations, so their workflow process have security requirements, such as restricting access to data or ensuring that process constraints are observed. These requirements are often managed by the workflow component, because of the close association between this sub-system and the processes it enacts. However, high quality security mechanisms and complex functionali...
متن کاملDesign Security for Internet-Based Workflow Management Systems Adopting Security Agents
With the expansion of WFMS(workflow management systems) across the Internet, collaboration among enterprises increase. The security problems of Intranet-based WFMS, which is operated on Intranet, are critical, and the effectiveness of Internet-Based WFMSs is deeply influenced by security. For the security of Internet-Based WFMSs, this study introduces the Login Agent, the Security Agent, and Ta...
متن کاملOn the Satisfiability of Constraints in Workflow Systems
The specification and enforcement of authorization policies such as separation of duty and binding of duty in workflow systems is an important area of current research in computer security. We introduce a formal model for constrained workflow systems that incorporate constraints for implementing such policies. We define an entailment constraint, which is defined on a pair of tasks in a workflow...
متن کاملOn Secure Workflow Decentralisation on the Internet
Decentralised workflow management systems are a new research area, where most work to-date has focused on the system’s overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach, and consider, from the perspective of available security building blocks, how security can be implemented and what new opportunities are prese...
متن کامل