2011
DOI: 10.1007/978-3-642-19680-5_16
|View full text |Cite
|
Sign up to set email alerts
|

A Data-Centric Approach for Privacy-Aware Business Process Enablement

Abstract: Abstract. In a SOA context, enterprises can use workflow technologies to orchestrate available business processes and their corresponding services and apply business rules or policies to control how they can be used and who can use them. This approach becomes a bit more complex when a set of business processes includes services that derive outside the company's domain and therefore can be difficult to align with existing rules/policies. In the privacy and security domain, access control and policy languages ar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0
1

Year Published

2011
2011
2019
2019

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 11 publications
0
5
0
1
Order By: Relevance
“…[30] models a system's behaviour in terms of a Business Processing Model Notation (BPMN) diagram and then the goal is to check whether this is compliant with the system's P3P privacy policy. [31] integrate links to the privacy policy in the system's workflow (e.g. the BPEL specification), these are then checked by an analysis tool at design time to determine if the workflow agrees with the policy.…”
Section: Privacy Frameworkmentioning
confidence: 99%
“…[30] models a system's behaviour in terms of a Business Processing Model Notation (BPMN) diagram and then the goal is to check whether this is compliant with the system's P3P privacy policy. [31] integrate links to the privacy policy in the system's workflow (e.g. the BPEL specification), these are then checked by an analysis tool at design time to determine if the workflow agrees with the policy.…”
Section: Privacy Frameworkmentioning
confidence: 99%
“…Chinosi et al [4] model a system's behaviour in terms of a Business Processing Model Notation (BPMN) diagram and then the goal is to check whether this is compliant with the system's P3P privacy policy. Short et al [25] integrate links to the privacy policy in the system's workflow (e.g. the BPEL specification), these are then checked by an analysis tool at design time to determine if the workflow agrees with the policy.…”
Section: Related Workmentioning
confidence: 99%
“…Short et al [30] provide an approach for dealing with the inclusion of internal and/or external services in a business process that contains data-handling policies. Wang et al [31] suggest a method to govern adaptive distributed business processes at run time with an aspect-oriented programming approach.…”
Section: Related Workmentioning
confidence: 99%