Institutional Repository

Access control needs in an electronic workflow environment

Show simple item record

dc.contributor.author Botha, RA
dc.contributor.editor Venter, L
dc.contributor.editor Lombard, R.R.
dc.date.accessioned 2018-08-15T16:42:52Z
dc.date.available 2018-08-15T16:42:52Z
dc.date.issued 2000
dc.identifier.citation Botha, R.A. (1997) Access control needs in an electronic workflow environment. Proceedings of the 1997 National Research and Development Conference: Towards 2000, South African Institute of Computer Science and Information Technology), Riverside Sun, 13-14 November, 2000, edited by L.M. Venter and R.R. Lombard (PUCHEE, VTC) en
dc.identifier.isbn 1-86822-300-0
dc.identifier.uri http://hdl.handle.net/10500/24659
dc.description.abstract This paper defines an electronic workflow environment as being conducive to the performance of business processes according to certain policies and practices in an electronic fashion. The workflow procedure will be facilitated by the flow of information (frequently contained in non-structured or semi-structured documents) on different routes between business roles according to certain rules. It is important that a business should be able to trust the information which is distributed through and generated in the workflow mechanism. Information security therefore is an extremely important aspect in the electronic workflow environment. The protection of the integrity of the information can be considered one of the principle building blocks in securing the environment. It is furthermore important to be able to prove that the information is authentic. The controls exercised by the electronic workflow environment should be able to keep information from being disclosed to unauthorized parties. Access control is, therefore, an important aspect, however the success of all access control mechanisms is reliant on the availability of authenticated identities. This paper evaluates the access control needs of the electronic workflow environment by studying the burdens that each of the components of the workflow environment places on the access control mechanism. The needs are illustrated by referring to electronic documents as one of the principle communication mechanisms in the workflow environment. Subsequently a checklist for the access control needs of the electronic workflow environment is presented. The paper then presents certain access control mechanisms and techniques that are frequently used. These are evaluated for use in an electronic workflow environment in terms of the presented checklist. This paper provides proof that conventional access control mechanisms and their related management techniques are insufficient for the much more dynamic electronic workflow environment. en
dc.language.iso en en
dc.title Access control needs in an electronic workflow environment en


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search UnisaIR


Browse

My Account

Statistics