A Data-Centric Approach for Privacy-Aware Business Process Enablement

نویسندگان

  • Stuart Short
  • Samuel Paul Kaluvuri
چکیده

In a SOA context, enterprises can use workflow technologies to orchestrate available business processes and their corresponding services and apply business rules or policies to control how they can be used and who can use them. This approach becomes a bit more complex when a set of business processes includes services that derive outside the company's domain and therefore can be difficult to align with existing rules/policies. In the privacy and security domain, access control and policy languages are used to define what actions can be performed on resources, by whom, for what purpose and in what context. In this paper we propose an approach for dealing with the inclusion of internal and/or external services in a business process that contains data handling policies.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy in Context-aware Mobile Business Applications

Privacy is a big barrier for the acceptance of mobile business applications. Users require full privacy control over their context data like identity, time schedule, profiles, location, etc. Platform for Privacy Preferences (P3P) from W3C proposes a privacy solution for internet users. The aim of this PhD is to extend P3P to support user-centric privacy aspects in both pull and push services re...

متن کامل

A Process View Framework for Artifact-Centric Business Processes

Over the past several years, the artifact-centric approach to workflow has emerged as a new paradigm of business process modelling. It provides a robust structure of workflow and supports the flexibility of workflow enactment and evolution especially in a collaborative environment. To facilitate and foster business collaborations, the customisation, privacy protection, and authority control of ...

متن کامل

Security in context-aware mobile business applications

The support of location computation on mobile devices (e.g. mobile phones, PDAs) has enabled the development of context-aware and especially locationaware applications (e.g. Restaurant Finder, Friend Finder) which are becoming the new trend for future software applications. However, fears regarding security and privacy are the biggest barriers against their success. Especially, mobile users are...

متن کامل

Towards Constructing a Trustworthy Internet: Privacy-Aware Transfer of Digital Identity Document in Content Centric Internetworking

Managing digital identity documents with a proper privacy protection is of pivotal importance to construct trustworthy Internet. As far as the amount of digital identities is expanding at an accelerating rate, content-centric model provides administration capabilities of data transfer. We propose an innovative approach and implementation of privacy-aware Content-Centric Internetworking (CCN)-ba...

متن کامل

A Modeling Tool for PHILharmonicFlows Objects and Lifecycle Processes

As opposed to contemporary activity-centric, process-aware information systems (PAIS), for which a multitude of concepts and implementations exist, there is only a very limited number of PAIS implementing data-centric, artifact-centric or object-aware approaches. This demo paper presents the implementation of a modeling environment for the object-aware approach to business process management. O...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011