dc.contributor.author |
Botha, RA
|
|
dc.contributor.author |
Eloff, JHP
|
|
dc.contributor.editor |
Petkov, D.
|
|
dc.contributor.editor |
Venter, L.
|
|
dc.date.accessioned |
2018-08-17T11:41:32Z |
|
dc.date.available |
2018-08-17T11:41:32Z |
|
dc.date.issued |
1998 |
|
dc.identifier.citation |
Botha, R.A. & Eloff, J.H.P. (1998) exA security interpretation of the workflow reference model. Proceedings of the annual research and development symposium, SAICSIT (South African Institute for Computer Scientists and Information Technologists), Van Riebeeck Hotel, Gordons Bay, Cape Town, 23-24 November 1998, |
en |
dc.identifier.isbn |
1-86840-303-3 |
|
dc.identifier.uri |
http://hdl.handle.net/10500/24690 |
|
dc.description.abstract |
This paper is intended as an opinion paper regarding information security concerns in the
Workflow Reference Model (WfRM) as defined by the Workflow Management Coalition
(WfMC). After an introduction into the workflow environment, the WfRM is described.
The security services, identification and authentication, authorization, confidentiality,
integrity and non-repudiation are briefly defined in order to serve as a framework for
further discussion. The main functional areas in the model are discussed in terms of the
mentioned security services. The paper concludes by identifying areas for further research. |
en |
dc.language.iso |
en |
en |
dc.title |
exA security interpretation of the workflow reference model |
en |