Distributed snapshots: determining global states of distributed systems
ACM Transactions on Computer Systems (TOCS)
Shopping models: a flexible architecture for information commerce
DL '97 Proceedings of the second ACM international conference on Digital libraries
Optimistic protocols for fair exchange
Proceedings of the 4th ACM conference on Computer and communications security
Distributed Algorithms
Introduction to Automata Theory, Languages and Computability
Introduction to Automata Theory, Languages and Computability
The P2P Approach to Interorganizational Workflows
CAiSE '01 Proceedings of the 13th International Conference on Advanced Information Systems Engineering
Erasure Coding Vs. Replication: A Quantitative Comparison
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Inter-operability of Workflow Applications: Local Criteria for Global Soundness
Business Process Management, Models, Techniques, and Empirical Studies
State-dependent security decisions for distributed object-systems
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Scalable Peer-to-Peer Process Management - The OSIRIS Approach
ICWS '04 Proceedings of the IEEE International Conference on Web Services
High availability in DHTs: erasure coding vs. replication
IPTPS'05 Proceedings of the 4th international conference on Peer-to-Peer Systems
Hi-index | 0.00 |
The control of actions performed by parties involved in a decentralized cross-organizational workflow is done by several independent workflow engines. Due to the lack of a centralized coordination control, an auditing is required which supports a reliable and secure detection of malicious actions performed by these parties. In this paper we identify several issues which have to be resolved for such a secure logging system. Further, security requirements for a decentralized data store are investigated and evaluated with regard to decentralized data stores.