Trust-Based secure workflow path construction

  • Authors:
  • M. Altunay;D. Brown;G. Byrd;R. Dean

  • Affiliations:
  • North Carolina State University, Raleigh;North Carolina State University, Raleigh;North Carolina State University, Raleigh;North Carolina State University, Raleigh

  • Venue:
  • ICSOC'05 Proceedings of the Third international conference on Service-Oriented Computing
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Security and trust relationships between services significantly govern their willingness to collaborate and participate in a workflow. Existing workflow tools do not consider such relationships as an integral part of their planning logic: rather, they approach security as a run-time issue. We present a workflow management framework that fully integrates trust and security into the workflow planning logic. It considers not only trust relationships between the workflow requestor and individual services, but also trust relationships among the services themselves. It allows each service owner to define an upper layer of collaboration policies (rules that specify the terms under which participation in a workflow is allowed) and integrates them into the planning logic. Services that are unfit for collaboration due to security violations are replaced at the planning stage. This approach increases the services owners’ control over the workflow path, their willingness for collaboration, and avoids run-time security failures.