skip to main content
10.1145/1363686.1364026acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Implementing secure document circulation: a prototype

Published:16 March 2008Publication History

ABSTRACT

Interoperable e-business applications are essential for increasing efficiency in the digital economy. We present an infrastructure based on our secure document circulation architecture model, designed for securing information flow for interorganisational workflows. We view this initial prototype as simply a proof-of-concept, and plug in various software tools to implement the prototype components. A simple example, based on a loan application workflow, is discussed to indicate the potential of this work.

References

  1. S. Bracher and P. Krishnan. Secure Document Circulation: An Architecture for e-Health. In Proceedings of the National e-Health Privacy and Security Symposium, pages 67--77, Brisbane, Australia, October 2006. QUT.Google ScholarGoogle Scholar
  2. M. H. Brun and C. Lanng. Reducing Barriers for E-business in SME's through an Open Service Oriented Infrastructure. In ICEC '06: Proceedings of the 8th International Conference on Electronic Commerce, pages 403--410, New York, NY, USA, 2006. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Campadello, L. Compagna, D. Gidoin, S. Holtmanns, V. Meduri, J.-C. Pazzaglia, M. Seguran, and R. Thomas. A7.D1.1 - Scenario selection and definition. Technical report, SERENITY (System Engineering for Security and Dependability), 2006. http://serenity-forum.org/Work-package-7-1.html?artsuite=0#sommaire_1.Google ScholarGoogle Scholar
  4. G. Feuerlicht and S. Meesathit. Design Method for Interoperable Web Services. In ICSOC '04: Proceedings of the 2nd International Conference on Service Oriented Computing, pages 299--307, New York, NY, USA, 2004. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Y. S. Kuo, L. Tseng, H.-C. Hu, and N. C. Shih. An XML Interaction Service for Workflow Applications. In DocEng '06: Proceedings of the 2006 ACM symposium on Document engineering, pages 53--55, New York, NY, USA, 2006. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Rossi. Orchestrating Document-based Workflows with X-Folders. In SAC '04: Proceedings of the 2004 ACM symposium on Applied computing, pages 503--507, New York, NY, USA, 2004. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-Based Access Control Models. IEEE Computer, 29(2):38--47, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Security Assertion Markup Language (SAML) (version 1.1). http://www.oasis-open.org/committees/tc_home. php?wg_abbrev=security#samlv11. OASIS, 2004.Google ScholarGoogle Scholar
  9. I. P. Vélez and B. Vélez. Lynx: An Open Architecture for Catalyzing the Deployment of Interactive Digital Government Workflow-Based Systems. In dg.o '06: Proceedings of the 2006 International Conference on Digital Government Research, pages 309--318, New York, NY, USA, 2006. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Web Services Business Process Execution Language (version 2.0). http://www.oasis-open.org/specs/index.php# wsbpelv2.0. OASIS, 2007.Google ScholarGoogle Scholar
  11. B. Xu, L. Jiang, and F. Ma. On the new B to B E-business Enabling Platform: cnXML in China. In ICEC '05: Proceedings of the 7th International Conference on Electronic Commerce, pages 681--684, New York, NY, USA, 2005. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Implementing secure document circulation: a prototype

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SAC '08: Proceedings of the 2008 ACM symposium on Applied computing
            March 2008
            2586 pages
            ISBN:9781595937537
            DOI:10.1145/1363686

            Copyright © 2008 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 16 March 2008

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate1,650of6,669submissions,25%
          • Article Metrics

            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader