Requirements for secure logging of decentralized cross-organizational workflow executions

  • Authors:
  • Andreas Wombacher;Roel Wieringa;Wim Jonker;Predrag Knežević;Stanislav Pokraev

  • Affiliations:
  • University of Twente, Enschede, The Netherlands;University of Twente, Enschede, The Netherlands;University of Twente, Enschede, The Netherlands;Integrated Publication and Information Systems Institute, Fraunhofer Gesellschaft, Darmstadt, Germany;Telematica Institute, Enschede

  • Venue:
  • OTM'05 Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet Systems
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

The control of actions performed by parties involved in a decentralized cross-organizational workflow is done by several independent workflow engines. Due to the lack of a centralized coordination control, an auditing is required which supports a reliable and secure detection of malicious actions performed by these parties. In this paper we identify several issues which have to be resolved for such a secure logging system. Further, security requirements for a decentralized data store are investigated and evaluated with regard to decentralized data stores.