Workflow analyzed for security and privacy in using databases

  • Authors:
  • Wouter Teepe;Reind van de Riet;Martin Olivier

  • Affiliations:
  • Department of Artificial Intelligence, State University of Groningen, Groningen, The Netherlands;Department of Mathematics and Computer Science, Vrije Universiteit, Amsterdam, The Netherlands;Department of Mathematics and Computer Science, Rand University, Johannesburg, South Africa

  • Venue:
  • Journal of Computer Security - IFIP 2000
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

When companies interchange information about individuals, privacy is at stake. On the basis of the purpose of the information interchange, rules can be designed for an agent (Alter-ego) to determine whether the requested information can be provided. This purpose can be derived from a WorkFlow specification according to which employees (agents) of one company are executing their tasks. Direct information flow as well as information which might flow through private and covert channels is considered.