Institutional Repository

exA security interpretation of the workflow reference model

Show simple item record

dc.contributor.author Botha, RA
dc.contributor.author Eloff, JHP
dc.contributor.editor Petkov, D.
dc.contributor.editor Venter, L.
dc.date.accessioned 2018-08-17T11:41:32Z
dc.date.available 2018-08-17T11:41:32Z
dc.date.issued 1998
dc.identifier.citation Botha, R.A. & Eloff, J.H.P. (1998) exA security interpretation of the workflow reference model. Proceedings of the annual research and development symposium, SAICSIT (South African Institute for Computer Scientists and Information Technologists), Van Riebeeck Hotel, Gordons Bay, Cape Town, 23-24 November 1998, en
dc.identifier.isbn 1-86840-303-3
dc.identifier.uri http://hdl.handle.net/10500/24690
dc.description.abstract This paper is intended as an opinion paper regarding information security concerns in the Workflow Reference Model (WfRM) as defined by the Workflow Management Coalition (WfMC). After an introduction into the workflow environment, the WfRM is described. The security services, identification and authentication, authorization, confidentiality, integrity and non-repudiation are briefly defined in order to serve as a framework for further discussion. The main functional areas in the model are discussed in terms of the mentioned security services. The paper concludes by identifying areas for further research. en
dc.language.iso en en
dc.title exA security interpretation of the workflow reference model en


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search UnisaIR


Browse

My Account

Statistics