Optimized workflow authorization in service oriented architectures

Martin Wimmer, Martina Cezara Albutiu, Alfons Kemper

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

Complex business processes are usually realized by specifying the integration and interaction of smaller modular software components. For example, hitherto monolithic enterprise resource planning systems (ERP) are decomposed into Web services which are then again orchestrated in terms of Web service workflows, bringing about higher levels of flexibility and adaptability. In general, such services constitute autonomous software components with their own dedicated security requirements. In this paper we present our approach for consolidating the access control of (Web service) workflows. The proposed security engineering method allows, first, to determine for whom workflows are executable from a privileges point of view, second, to assess compliance with the principle of least privilege, and, third, helps to reduce policy enforcement costs.

Original languageEnglish
Title of host publicationEmerging Trends in Information and Communication Security - International Conference, ETRICS 2006, Proceedings
PublisherSpringer Verlag
Pages30-44
Number of pages15
ISBN (Print)3540346406, 9783540346401
DOIs
StatePublished - 2006
EventInternational Conference on Emerging Trends in Information and Communication Security, ETRICS 2006 - Freiburg, Germany
Duration: 6 Jun 20069 Jun 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3995 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInternational Conference on Emerging Trends in Information and Communication Security, ETRICS 2006
Country/TerritoryGermany
CityFreiburg
Period6/06/069/06/06

Fingerprint

Dive into the research topics of 'Optimized workflow authorization in service oriented architectures'. Together they form a unique fingerprint.

Cite this