Access control mechanisms for inter-organizational workflow
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Towards usage control models: beyond traditional access control
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Designing a distributed access control processor for network services on the Web
Proceedings of the 2002 ACM workshop on XML security
Cryptographic access control in a distributed file system
Proceedings of the eighth ACM symposium on Access control models and technologies
Originator Control in Usage Control
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
An access control framework for business processes for web services
Proceedings of the 2003 ACM workshop on XML security
A reference monitor for workflow systems with constrained task execution
Proceedings of the tenth ACM symposium on Access control models and technologies
Inter-instance authorization constraints for secure workflow management
Proceedings of the eleventh ACM symposium on Access control models and technologies
Fundamental Modeling Concepts: Effective Communication of IT Systems
Fundamental Modeling Concepts: Effective Communication of IT Systems
A data outsourcing architecture combining cryptography and access control
Proceedings of the 2007 ACM workshop on Computer security architecture
Controlling access to published data using cryptography
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
Securing the core with an Enterprise Key Management Infrastructure (EKMI)
Proceedings of the 7th symposium on Identity and trust on the Internet
SynCFr: Synchronization Collaboration Framework
ICIW '09 Proceedings of the 2009 Fourth International Conference on Internet and Web Applications and Services
Collaborative business and data privacy: Toward a cyber-control?
Computers in Industry - Special issue: The digital factory: an instrument of the present and the future
Hi-index | 0.00 |
The authors describe a model to provide access control for information flow that crosses organisational boundaries. The model specifies a distributed access control enforcement approach for workflow objects e.g., a document assigned to a pre-defined workflow using software agents and data encryption techniques. Access to restricted content within the workflow object is based on the possession of encryption keys and role enactment. The model relies on trusted software agents to verify and ensure the validity of the workflow object. The authors construct a prototype and report on a case study that demonstrates the feasibility of the proposal.