47 research outputs found

    Task Delegation Based Access Control Models for Workflow Systems

    Get PDF
    International audiencee-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model

    Responsible AI and Analytics for an Ethical and Inclusive Digitized Society

    Get PDF
    publishedVersio

    Dynamic Authorisation Policies for Event-based Task Delegation

    Get PDF
    International audienceTask delegation presents one of the business process security leitmotifs. It denes a mechanism that bridges the gap between both workfow and access control systems. There are two important issues relating to delegation, namely allowing task delegation to complete, and having a secure delegation within a workfow. Delegation completion and authorisation enforcement are specied under specic constraints. Constraints are dened from the delegation context implying the presence of a xed set of delegation events to control the delegation execution. In this paper, we aim to reason about delegation events to specify delegation policies dynamically. To that end, we present an event-based task delegation model to monitor the delegation process. We then identify relevant events for authorisation enforcement to specify delegation policies. Moreover, we propose a technique that automates delegation policies using event calculus to control the delegation execution and increase the compliance of all delegation changes in the global policy

    The Wooster Voice (Wooster, OH), 2006-09-22

    Get PDF
    This edition of the College of Wooster\u27s student run newspaper was published on September 22 of 2006, and it is eight pages long. Information about the roots of the social media network, Facebook, heads the first page. Spinach has been removed from grocery stores, and Lowry as a precaution to the warning of an E coli outbreak. The mascot at the football games will no longer be the Scottie McWoo, but instead the Fighting Scot. The rumors that have been circulating campus about the UG permanently closing are not true. This year\u27s fall fashion trends are elaborated on on page six. The athletic updates for the week are on pages seven and eight.https://openworks.wooster.edu/voice2001-2011/1144/thumbnail.jp

    BioVault : a protocol to prevent replay in biometric systems

    Get PDF
    D.Com. (Informatics)Please refer to full text to view abstrac

    Current and Future Issues in BPM Research: A European Perspective from the ERCIS Meeting 2010

    Get PDF
    Business process management (BPM) is a still-emerging field in the academic discipline of Information Systems (IS). This article reflects on a workshop on current and future issues in BPM research that was conducted by seventeen IS researchers from eight European countries as part of the 2010 annual meeting of the European Research Center for Information Systems (ERCIS). The results of this workshop suggest that BPM research can meaningfully contribute to investigating a broad variety of phenomena that are of interest to IS scholars, ranging from rather technical (e.g., the implementation of software architectures) to managerial (e.g., the impact of organizational culture on process performance). It further becomes noticeable that BPM researchers can make use of several research strategies, including qualitative, quantitative, and design-oriented approaches. The article offers the participants’ outlook on the future of BPM research and combines their opinions with research results from the academic literature on BPM, with the goal of contributing to establishing BPM as a distinct field of research in the IS discipline

    Using Simulation to Aid Decision Making in Managing the Usability Evaluation Process

    Get PDF
    Context: This paper is developed in the context of Usability Engineering. More specifically, it focuses on the use of modelling and simulation to help decision-making in the scope of usability evaluation. Objective: The main goal of this paper is to present UESim: a System Dynamics simulation model to help decision-making in the make-up of the usability evaluation team during the process of usability evaluation. Method: To develop this research we followed four main research phases: a) study identification, b) study development, c) running and observation and finally, d) reflexion. In relation with these phases the paper describes the literature revision, the model building and validation, the model simulation and its results and finally the reflexion on it. Results: We developed and validated a model to simulate the usability evaluation process. Through three different simulations we analysed the effects of different compositions of the evaluation team on the outcome of the evaluation. The simulation results show the utility of the model in the decision making of the usability evaluation process by changing the number and expertise of evaluators employed. Conclusion: One of the main advantages of using such a simulation model is that it allows developers to observe the evolution of the key indicators of the evaluation process over time. UESim represents a customisable tool to help decision-making in the management of the usability evaluation process, since it makes it possible to analyse how the key process indicators are affected by the main management options of the Usability Evaluation Process

    ECIS 2010 Panel Report: Humanities-Enriched Information Systems

    Get PDF
    This article builds on a panel on Humanities-Enriched Information Systems presented at the 2010 European Conference on Information Systems (ECIS), held in Pretoria, South Africa, June 6–9, 2010. The aim of the panel discussion was to stimulate a meta-theoretical discussion about the relationship between the Humanities and Information Systems in a way opposite to the usual. A lot of research has been conducted on the application of computing in the Humanities, but this panel explored the reverse process of enrichment that takes place. The purpose was to give recognition to work that has already been done in this regard by means of identifying a substantial sub-discipline, but also to inspire more and deliberate research that explores ways to enhance Information Systems by interweaving insights and methods from the Humanities. Such an endeavor may enhance ICT to empower the communities using these technologies

    The Murray Ledger and Times, April 19, 2016

    Get PDF
    corecore