A strategy for mls workflow

Vlad Ingar Wietrzyk, Makoto Takizawa, Vijay Varadharajan

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)

Abstract

This paper describes the design of a model as well as an architecture to provide support for distributed advanced workflow transactions. We discuss the application of transaction concepts to activities that involve integrated execution of multiple tasks over different processes. This kind of applications are described as transactional workflows. The classical commit protocol, used in many commercial systems, is not suitable for use in multilevel secure distributed workflow database systems that use a locking protocol for concurrency control. We choose to develop formal framework for secure distributed workflow architecture since we are actively involved in building a prototype of such a system. We strive to develop a practical logical characterization of multilevel secure (MLS) distributed workflow for the first time using the inherently difficult concept of non-monotonic reasoning.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 6th Australasian Conference, ACISP 2001 Sydney, Australia, July 11-13, 2001 Proceedings
EditorsVijay Varadharajan, Yi Mu
Place of PublicationBerlin
PublisherSpringer, Springer Nature
Pages159-175
Number of pages17
Volume2119
ISBN (Print)3540423001
DOIs
Publication statusPublished - 2001
Event6th Australasian Conference on Information Security and Privacy, ACISP - 2001 - Sydney, Australia
Duration: 11 Jul 200113 Jul 2001

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2119
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other6th Australasian Conference on Information Security and Privacy, ACISP - 2001
CountryAustralia
CitySydney
Period11/07/0113/07/01

Fingerprint Dive into the research topics of 'A strategy for mls workflow'. Together they form a unique fingerprint.

Cite this