Skip to main content

Evaluation of User Specific Privacy Policy Architecture for Collaborative BPaaS on the Example of Logistics

  • Conference paper
  • First Online:
Information Technology for Management: New Ideas and Real Solutions (ISM 2016, AITM 2016)

Abstract

Nowadays, collaboration between multiple companies along the supply chain is one of the key factors for ensuring sustainable success. Although this fact is known by almost all companies the actual collaboration is quite low because of the fear of losing sensitive and critical data to competitors. To solve this problem an architecture for modeling and execution of privacy preserved business processes and a privacy modeling approach have been developed. This paper evaluates both artifacts. The used method is framework for evaluation in design science (FEDS).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Wolf, M.-B., Rahn, J., Hompel, M.T.: Cloud Computing für Logistik 2: Akzeptanz und Nutzungsbereitschaft der Logistics Mall bei Anwendern und Anbietern: [eine qualitative und quantitative empirische Analyse des Fraunhofer-Institutes für Materialfluss und Logistik IML. Fraunhofer Verlag (2013)

    Google Scholar 

  2. Schwarzbach, B., Pirogov, A., Schier, A., Franczyk, B.: Inter-cloud architecture for privacy-preserving collaborative BPaaS. QUIS14 (2015)

    Google Scholar 

  3. Takabi, H., Joshi, J.B.D., Ahn, G.-J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24–31 (2010)

    Article  Google Scholar 

  4. Bélanger, F., Crossler, R.E.: Privacy in the digital age: a review of information privacy research in information systems. MIS Q. 35(4), 1017–1042 (2011)

    Google Scholar 

  5. Schwarzbach, B., Glöckner, M., Pirogov, A., Röhling, M.M., Franczyk, B.: Secure service interaction for collaborative business processes in the inter-cloud. In: 2015 Federated Conference on Computer Science and Information Systems, pp. 1377–1386. IEEE (2015). doi:10.15439/2015F282

  6. Pearson, S.: Taking account of privacy when designing cloud computing services. In: Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, pp. 44–52 (2009)

    Google Scholar 

  7. Bundesamt, S.: 12% der Unternehmen setzen auf Cloud Computing. https://www.destatis.de/DE/PresseService/Presse/Pressemitteilungen/2014/12/PD14\textunderscore467\textunderscore52911.html(2014)

  8. Singhal, M., Chandrasekhar, S., Ge, T., Sandhu, R., Krishnan, R., Ahn, G.-J., Bertino, E.: Collaboration in multicloud computing environments: framework and security issues. Computer (2013). doi:10.1109/MC.2013.46

    Google Scholar 

  9. Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.): DBSec 2012. LNCS, vol. 7371. Springer, Heidelberg (2012). doi:10.1007/978-3-642-31540-4

    MATH  Google Scholar 

  10. Lindqvist, H.: Mandatory access control. Master’s Thesis in Computing Science, Umea University, Department of Computing Science, SE-901, vol. 87 (2006)

    Google Scholar 

  11. Ferraiolo, D., Cugini, J., Kuhn, D.R.: Role-Based Access Control (RBAC): features and motivations. In: Proceedings of 11th Annual Computer Security Application Conference, pp. 241–248 (1995)

    Google Scholar 

  12. Zahid, I., Josef, N.: Towards semantic-enhanced attribute-based access control for cloud services. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1223–1230 (2012). doi:10.1109/TrustCom.2012.280

  13. Jin, X., Krishnan, R., Sandhu, R.: A unified attribute-based access control model covering DAC, MAC and RBAC. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol. 7371, pp. 41–55. Springer, Heidelberg (2012). doi:10.1007/978-3-642-31540-4_4

    Chapter  Google Scholar 

  14. Ferraiolo, D.F., Kuhn, D.R.: Role-based access controls. arXiv preprint arXiv:0903.2171 (2009)

  15. Gouglidis, A., Mavridis, I.: domRBAC: an access control model for modern collaborative systems. Comput. Secur. 31(4), 540–556 (2012)

    Article  Google Scholar 

  16. Le, X.H., Wang, D.: Development of a system framework for implementation of an enhanced role-based access control model to support collaborative processes. In: Proceedings of 3rd USENIX Workshops on Health Security and Privacy (2012)

    Google Scholar 

  17. Le, X.H., Doll, T., Barbosu, M., Luque, A., Wang, D.: An enhancement of the role-based access control model to facilitate information access management in context of team collaboration and workflow. J. Biomed. Inform. 45(6), 1084–1107 (2012)

    Article  Google Scholar 

  18. Le, X.H., Doll, T., Barbosu, M., Luque, A., Wang, D.: Evaluation of an enhanced role-based access control model to manage information access in collaborative processes for a statewide clinical education program. J. Biomed. Inf. (2014). doi:10.1016/j.jbi.2013.11.007

    Google Scholar 

  19. Hu, V.C., Ferraiolo, D., Kuhn, R., Schnitzer, A., Sandlin, K., Miller, R., Scarfone, K.: Guide to Attribute Based Access Control (ABAC) definition and considerations. national institute of standards and technology (2014)

    Google Scholar 

  20. Venable, J., Pries-Heje, J., Baskerville, R.: FEDS: a framework for evaluation in design science research. Eur. J. Inf. Syst. (2014). doi:10.1057/ejis.2014.36

    Google Scholar 

  21. Hevner, A., March, S., Park, J., Ram, S.: Design science in information systems research. MIS Q. 28(1), 75–105 (2004)

    Google Scholar 

  22. Wiliam, D., Black, P.: Meanings and consequences: a basis for distinguishing formative and summative functions of assessment? Brit. Educ. Res. J. 22(5), 537–548 (1996)

    Article  Google Scholar 

  23. Sun, Y., Kantor, P.B.: Cross-evaluation: a new model for information system evaluation. J. Am. Soc. Inf. Sci. Technol. (2006). doi:10.1002/asi.20324

    Google Scholar 

  24. Stufflebeam, D.L.: The CIPP model for evaluation. In: Kellaghan, T., Stufflebeam, D.L. (eds.) International Handbook of Educational Evaluation, vol. 9, pp. 31–62. Springer, Dordrecht (2003). Kluwer International Handbooks of Education

    Chapter  Google Scholar 

  25. Mathiassen, L., Munk-Madsen, A., Nielsen, P.A., Stage, J., Jacksen, M.: Object-Oriented Analysis and Design. Marko, Aalborg (2000)

    Google Scholar 

  26. Smithson, S., Hirschheim, R.: Analysing information systems evaluation: another look at an old problem. Eur. J. Inf. Syst. (1998). doi:10.1057/palgrave.ejis.3000304

    Google Scholar 

  27. Nergaard, H., Ulltveit-Moe, N., Gjøsæter, T.: A scratch-based graphical policy editor for XACML. In: ICISSP 2015 Proceedings of the 1st International Conference on Information Systems Security and Privacy ESEO, Angers, Loire Valley, France, pp. 182–191 (2015)

    Google Scholar 

Download references

Acknowledgement

The work presented in this paper was funded by the German Federal Ministry of Education and Research under the projects PREsTiGE (BMBF 16KIS0082K) and LSEM (BMBF 03IPT504X).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Björn Schwarzbach .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Schwarzbach, B., Glöckner, M., Franczyk, B., Ludwig, A. (2017). Evaluation of User Specific Privacy Policy Architecture for Collaborative BPaaS on the Example of Logistics. In: Ziemba, E. (eds) Information Technology for Management: New Ideas and Real Solutions. ISM AITM 2016 2016. Lecture Notes in Business Information Processing, vol 277. Springer, Cham. https://doi.org/10.1007/978-3-319-53076-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-53076-5_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-53075-8

  • Online ISBN: 978-3-319-53076-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics