On secure workflow decentralisation on the internet

dc.contributor.authorKaskenpalo, P
dc.date.accessioned2011-12-13T22:00:08Z
dc.date.accessioned2011-12-13T22:02:29Z
dc.date.available2011-12-13T22:00:08Z
dc.date.available2011-12-13T22:02:29Z
dc.date.copyright2010
dc.date.issued2010
dc.description.abstractDecentralised workflow management systems are a new research area, where most work to-date has focused on the system's overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach, and consider, from the perspective of available security building blocks, how security can be implemented and what new opportunities are presented when empowering the decentralised environment with modern distributed security protocols. Our research is motivated by a more general question of how to combine the positive enablers that email exchange enjoys, with the general benefits of workflow systems, and more specifically with the benefits that can be introduced in a decentralised environment. This aims to equip email users with a set of tools to manage the semantics of a message exchange, contents, participants and their roles in the exchange in an environment that provides inherent assurances of security and privacy. This work is based on a survey of contemporary distributed security protocols, and considers how these protocols could be used in implementing a distributed workflow management system with decentralised control . We review a set of these protocols, focusing on the required message sequences in reviewing the protocols, and discuss how these security protocols provide the foundations for implementing core control-flow, data, and resource patterns in a distributed workflow environment.
dc.identifier.citation5th International Federated Conferences on Distributed Computing Techniques, Amsterdam, Netherland, 2010-06-07 - 2010-06-10.
dc.identifier.roid15000en_NZ
dc.identifier.urihttps://hdl.handle.net/10292/3096
dc.publisherCentrum Wiskunde & Informatica
dc.relation.isreplacedby10292/4202
dc.relation.isreplacedbyhttp://hdl.handle.net/10292/4202
dc.relation.replaceshttp://hdl.handle.net/10292/3095
dc.relation.replaces10292/3095
dc.relation.urihttp://discotec.project.cwi.nl/index.php/Programme
dc.rightsNOTICE: this is the author’s version of a work that was accepted for publication. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in (see Citation). The original publication is available at (see Publisher's Version)
dc.rights.accessrightsOpenAccess
dc.subjectCryptography and Security
dc.subjectDistributed
dc.subjectParallel
dc.subjectCluster Computing
dc.titleOn secure workflow decentralisation on the internet
dc.typeConference Contribution
pubs.organisational-data/AUT
pubs.organisational-data/AUT/Design & Creative Technologies
pubs.organisational-data/AUT/Design & Creative Technologies/School of Computing & Mathematical Science
pubs.organisational-data/AUT/PBRF Researchers
pubs.organisational-data/AUT/PBRF Researchers/Design & Creative Technologies PBRF Researchers
pubs.organisational-data/AUT/PBRF Researchers/Design & Creative Technologies PBRF Researchers/DCT C & M Computing
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
PetteriDisCoTech.pdf
Size:
878.76 KB
Format:
Adobe Portable Document Format
Description: