Abstract
In this paper we present a method for the design and realization of security-critical inter-organizational workflows. We focus on the systematic development of secure solutions based on the thorough elicitation of security requirements. Our basic view is a network of partners cooperating in a controlled way by calling services and exchanging documents. The method presented is based on two orthogonal views. In the interface view each partner is seen as a component offering a set of services with given properties and permissions. In the workflow view the orchestration of these services is defined both at a global and at a local level. Our approach is based on a reference architecture that allows the local control of workflow instances. Security requirements are realized by security components and web services implementing the business logic.
| Original language | English |
|---|---|
| Title of host publication | IASSE 2004 Proc. of the 13th International Conference on Intelligent and Adaptive Systems and Software Engineering |
| Pages | 6 |
| Number of pages | 6 |
| Publication status | Published - 2004 |
| Event | IASSE 2004 - Duration: 1 Jan 2004 → … |
Conference
| Conference | IASSE 2004 |
|---|---|
| Period | 1/01/04 → … |
Research Field
- Not defined
Keywords
- inter-organizational workflows
- security
- object oriented modelling
- UML
Fingerprint
Dive into the research topics of 'Modeling and Realizing Security-Critical Inter-Organizational Workflows'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver