Controlling usage in business process workflows through fine-grained security policies

Benjamin Aziz, A. Arenas, F. Martinelli, I. Matteucci, P. Mori

Research output: Contribution to conferenceOtherpeer-review

Abstract

We propose a language for expressing fine-grained security policies for controlling orchestrated business processes modelled as a BPEL workflow. Our policies are expressed as a process algebra that permits a BPEL activity, denies it or force-terminates it. The outcome is evaluates with compensation contexts. Finally, we give an example of these policies in a distributed map processing scenario such that the policies constrain service interactions in the workflow according to the security requirements of each entity participating in the workflow.
Original languageEnglish
Pages100-117
Number of pages18
Publication statusPublished - Sep 2008
Event5th International Conference on Trust, Privacy and Security in Digital Business - Turin, Italy
Duration: 4 Sep 20085 Sep 2008

Conference

Conference5th International Conference on Trust, Privacy and Security in Digital Business
Abbreviated titleTrustBus 2008
CountryItaly
CityTurin
Period4/09/085/09/08

Fingerprint

Dive into the research topics of 'Controlling usage in business process workflows through fine-grained security policies'. Together they form a unique fingerprint.

Cite this