메뉴 건너뛰기




Volumn 24, Issue 3, 2012, Pages 416-432

On the prevention of fraud and privacy exposure in process information flow

Author keywords

Data privacy; Information security; Open Jackson networks; Queueing theory; Workflow optimization

Indexed keywords

COMPLEX WORKFLOWS; CONFIDENTIAL DATA; DATA EXPOSURE; DATA INTERCHANGE; DIGITAL TRANSFORMATION; ELECTRONIC PAYMENT SYSTEMS; EMPLOYEE SKILLS; IMPLEMENTATION ANALYSIS; IN-PROCESS; INTERNAL SECURITY; JACKSON; JACKSON NETWORKS; NETWORK MODELING; ON-LINE BANKING; OPERATIONAL COSTS; OPTIMAL STAFFING; PRIVATE INFORMATION; ROLE-BASED ACCESS CONTROL; SECURITY CONSIDERATIONS; SECURITY REQUIREMENTS; SECURITY VULNERABILITIES; WORK-FLOWS; WORKFLOW OPTIMIZATION;

EID: 84867511196     PISSN: 10919856     EISSN: 15265528     Source Type: Journal    
DOI: 10.1287/ijoc.1110.0461     Document Type: Article
Times cited : (17)

References (46)
  • 2
    • 82355193628 scopus 로고    scopus 로고
    • Association of Certified Fraud Examiners. Report, ACFE, Austin, TX
    • Association of Certified Fraud Examiners. 2010. Report to the nations on occupational fraud and abuse. Report, ACFE, Austin, TX. http://butest.acfe.com/ rttn/rttn-2010.pdf.
    • (2010) Report to the Nations on Occupational Fraud and Abuse
  • 3
    • 20844432808 scopus 로고    scopus 로고
    • Chinese wall security for decentralized workflow management systems
    • Atluri, V., S. A. Chun, P. Mazzoleni. 2004. Chinese wall security for decentralized workflow management systems. J. Comput. Security 12(6) 799-840.
    • (2004) J. Comput. Security , vol.12 , Issue.6 , pp. 799-840
    • Atluri, V.1    Chun, S.A.2    Mazzoleni, P.3
  • 4
    • 0031070705 scopus 로고    scopus 로고
    • Scheduling workforce and workflow in a high volume factory
    • Berman, O., R. C. Larson, E. Pinker. 1997. Scheduling workforce and workflow in a high volume factory. Management Sci. 43(2) 158-172.
    • (1997) Management Sci. , vol.43 , Issue.2 , pp. 158-172
    • Berman, O.1    Larson, R.C.2    Pinker, E.3
  • 6
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Bertino, E., E. Ferrari, V. Atluri. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inform. System Security 2(1) 65-104.
    • (1999) ACM Trans. Inform. System Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 8
    • 33644511399 scopus 로고    scopus 로고
    • Collaborative business and data privacy: Toward a cyber-control?
    • Biennier, F., J. Favrel. 2005. Collaborative business and data privacy: Toward a cyber-control? Comput. Indust. 56(4) 361-370.
    • (2005) Comput. Indust. , vol.56 , Issue.4 , pp. 361-370
    • Biennier, F.1    Favrel, J.2
  • 10
    • 0034810791 scopus 로고    scopus 로고
    • Separation of duties for access control enforcement in workflow environments
    • Botha, R. A., J. H. P. Eloff. 2001. Separation of duties for access control enforcement in workflow environments. IBM Systems J. 40(3) 666-682.
    • (2001) IBM Systems J. , vol.40 , Issue.3 , pp. 666-682
    • Botha, R.A.1    Eloff, J.H.P.2
  • 11
    • 41049117983 scopus 로고    scopus 로고
    • Specification, planning, and execution of QoS-aware grid workflows within the Amadeus environment
    • Brandic, I., S. Pllana, S. Benkner. 2008. Specification, planning, and execution of QoS-aware grid workflows within the Amadeus environment. Concurrency Comput.: Practice Experience 20(4) 331-345.
    • (2008) Concurrency Comput.: Practice Experience , vol.20 , Issue.4 , pp. 331-345
    • Brandic, I.1    Pllana, S.2    Benkner, S.3
  • 12
    • 0028515494 scopus 로고
    • Policy resolution in workflow management systems
    • Bussler, C. J. 1994. Policy resolution in workflow management systems. Digital Tech. J. 6(4) 26-49.
    • (1994) Digital Tech. J. , vol.6 , Issue.4 , pp. 26-49
    • Bussler, C.J.1
  • 13
    • 0035594917 scopus 로고    scopus 로고
    • Managing workflow authorization constraints through active database technology
    • Casati, F., S. Castano, M. Fugini. 2001. Managing workflow authorization constraints through active database technology. Inform. Systems Frontiers 3(3) 319-338.
    • (2001) Inform. Systems Frontiers , vol.3 , Issue.3 , pp. 319-338
    • Casati, F.1    Castano, S.2    Fugini, M.3
  • 15
    • 58649085246 scopus 로고    scopus 로고
    • An ant colony optimization approach to a grid workflow scheduling problem with various QoS requirements
    • Chen, W. N., J. Zhang. 2009. An ant colony optimization approach to a grid workflow scheduling problem with various QoS requirements. IEEE Trans. Systems, Man, Cybernetics 39(1) 29-43.
    • (2009) IEEE Trans. Systems, Man, Cybernetics , vol.39 , Issue.1 , pp. 29-43
    • Chen, W.N.1    Zhang, J.2
  • 16
    • 84867531174 scopus 로고    scopus 로고
    • Computer Security Institute, Report, CSI, New York
    • Computer Security Institute. 2009. The 14th annual CSI computer crime and security survey. Report, CSI, New York. http://www.pathmaker.biz/whitepapers/ CSISurvey2009.pdf.
    • (2009) The 14th Annual CSI Computer Crime and Security Survey
  • 17
    • 84869688548 scopus 로고    scopus 로고
    • IRS employee sentenced for snooping
    • Coombes, A. 2008. IRS employee sentenced for snooping. Market-Watch (August 20), http://www.marketwatch.com/story/irsworker-snooped-on-tax-records- of-almost-200-celebrities.
    • (2008) Market-Watch (August 20)
    • Coombes, A.1
  • 18
    • 0033464665 scopus 로고    scopus 로고
    • Information privacy concerns, procedural fairness and impersonal trust: An empirical investigation
    • Culnan, M. J., P. K. Armstrong. 1999. Information privacy concerns, procedural fairness and impersonal trust: An empirical investigation. Organ. Sci. 10(1) 104-115.
    • (1999) Organ. Sci. , vol.10 , Issue.1 , pp. 104-115
    • Culnan, M.J.1    Armstrong, P.K.2
  • 19
    • 0031605514 scopus 로고    scopus 로고
    • Workflow optimization through task redesign in business information processes
    • IEEE Computer Society, Washington, DC
    • Dewan, R., A. Seidmann, Z. Walter. 1998. Workflow optimization through task redesign in business information processes. Proc. 31st Annual Hawaii Internat. Conf. System Sci., Vol. 1. IEEE Computer Society, Washington, DC, 240-252.
    • (1998) Proc. 31st Annual Hawaii Internat. Conf. System Sci. , vol.1 , pp. 240-252
    • Dewan, R.1    Seidmann, A.2    Walter, Z.3
  • 20
    • 0142250279 scopus 로고    scopus 로고
    • Authorization and access control in adaptive workflows
    • E. Snekkenes, D. Gollmann, eds. Comput. Security-ESORICS 2003. Springer, Berlin
    • Domingos, D., A. Rito-Silva, P. Veiga. 2003. Authorization and access control in adaptive workflows. E. Snekkenes, D. Gollmann, eds. Comput. Security-ESORICS 2003. Lecture Notes Computer Science, Vol. 2808. Springer, Berlin, 23-38.
    • (2003) Lecture Notes Computer Science , vol.2808 , pp. 23-38
    • Domingos, D.1    Rito-Silva, A.2    Veiga, P.3
  • 21
    • 33646190862 scopus 로고    scopus 로고
    • Personal schedules for workflow systems
    • A. ter Hofstede, M. Weske, eds. Proc. Internat. Conf. Bus. Process Management. Springer, Berlin
    • Eder, J., M. Ninaus, H. Pichler. 2003. Personal schedules for workflow systems. A. ter Hofstede, M. Weske, eds. Proc. Internat. Conf. Bus. Process Management. Lecture Notes Computer Science, Vol. 2678, Springer, Berlin, 216-231.
    • (2003) Lecture Notes Computer Science , vol.2678 , pp. 216-231
    • Eder, J.1    Ninaus, M.2    Pichler, H.3
  • 22
    • 81855176591 scopus 로고    scopus 로고
    • Future Strategies Inc., Lighthouse Point, FL
    • Fischer, L., ed. 2007. BPM and Workflow Handbook. Future Strategies Inc., Lighthouse Point, FL.
    • (2007) BPM and Workflow Handbook
    • Fischer, L.1
  • 24
    • 0036602405 scopus 로고    scopus 로고
    • Privacy protection of binary confidential data against deterministic, stochastic, and insider threat
    • Garfinkel, R., R. D. Gopal, P. Goes. 2002. Privacy protection of binary confidential data against deterministic, stochastic, and insider threat. Management Sci. 48(6) 749-764.
    • (2002) Management Sci. , vol.48 , Issue.6 , pp. 749-764
    • Garfinkel, R.1    Gopal, R.D.2    Goes, P.3
  • 26
    • 0010032891 scopus 로고    scopus 로고
    • Computational issues in secure interoperation
    • Gong, L., X. Qian. 1996. Computational issues in secure interoperation. IEEE Trans. Software Engrg. 22(1) 43-52.
    • (1996) IEEE Trans. Software Engrg. , vol.22 , Issue.1 , pp. 43-52
    • Gong, L.1    Qian, X.2
  • 28
    • 84867488313 scopus 로고    scopus 로고
    • GVU Center. Georgia Institute of Technology, Atlanta
    • GVU Center. 1997. GVU's seventh WWW user survey. Georgia Institute of Technology, Atlanta. http://www.cc.gatech.edu/gvu/user-surveys/survey-1997-04.
    • (1997) GVU's Seventh WWW User Survey
  • 30
    • 9544223971 scopus 로고    scopus 로고
    • A secure workflow model
    • Australian Computer Society, Darlinghurst, Australia
    • Hung, P. C. K., K. Karlapalem. 2003. A secure workflow model. Proc. Australasian Inform. Security Workshop, Vol. 21. Australian Computer Society, Darlinghurst, Australia, 33-41.
    • (2003) Proc. Australasian Inform. Security Workshop , vol.21 , pp. 33-41
    • Hung, P.C.K.1    Karlapalem, K.2
  • 32
    • 33847045247 scopus 로고    scopus 로고
    • Minimizing information loss and preserving privacy
    • Menon, S., S. Sarkar. 2007. Minimizing information loss and preserving privacy. Management Sci. 53(1) 101-116.
    • (2007) Management Sci. , vol.53 , Issue.1 , pp. 101-116
    • Menon, S.1    Sarkar, S.2
  • 34
    • 1142266729 scopus 로고    scopus 로고
    • Privacy versus willingness to disclose in e-commerce exchanges: The effect of risk awareness on the relative role of trust and control
    • Olivero, N., P. Lunt. 2004. Privacy versus willingness to disclose in e-commerce exchanges: The effect of risk awareness on the relative role of trust and control. J. Econom. Psych. 25(2) 243-262.
    • (2004) J. Econom. Psych. , vol.25 , Issue.2 , pp. 243-262
    • Olivero, N.1    Lunt, P.2
  • 35
    • 0033489645 scopus 로고    scopus 로고
    • Optimistic security: A new access control paradigm
    • ACM, New York
    • Povey, D. 2000. Optimistic security: A new access control paradigm. Proc. 1999 Workshop on New Security Paradigms, ACM, New York, 40-45.
    • (2000) Proc. 1999 Workshop on New Security Paradigms , pp. 40-45
    • Povey, D.1
  • 39
    • 0031387996 scopus 로고    scopus 로고
    • Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments
    • Thomas, R. K. 1997. Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments. Proc. 2nd ACM Workshop Role-Based Access Control, ACM, New York, 13-19.
    • (1997) Proc. 2nd ACM Workshop Role-Based Access Control, ACM, New York , pp. 13-19
    • Thomas, R.K.1
  • 42
    • 84867488275 scopus 로고    scopus 로고
    • Obama urges inquiry into passport snooping
    • Verjee, Z., J. Yellin, T. Frieden, T. Barrett. 2008. Obama urges inquiry into passport snooping. CNN (March 21), http://www.cnn.com/2008/POLITICS/03/21/ obama.passport/index.html.
    • (2008) CNN (March 21)
    • Verjee, Z.1    Yellin, J.2    Frieden, T.3    Barrett, T.4
  • 43
    • 33751436350 scopus 로고    scopus 로고
    • DW-RBAC: A formal security model of delegation and revocation in workflow systems
    • Wainer, J., A. Kumar, P. Barthelmess. 2007. DW-RBAC: A formal security model of delegation and revocation in workflow systems. Inform. Syststems 3(3) 365-384.
    • (2007) Inform. Syststems , vol.3 , Issue.3 , pp. 365-384
    • Wainer, J.1    Kumar, A.2    Barthelmess, P.3
  • 44
    • 0036161253 scopus 로고    scopus 로고
    • Authorization and access control of application data in workflow systems
    • Wu, S., A. Sheth, J. Miller, Z. Luo. 2002. Authorization and access control of application data in workflow systems. J. Intelliegent Inform. Systems. 18(1) 71-94.
    • (2002) J. Intelliegent Inform. Systems. , vol.18 , Issue.1 , pp. 71-94
    • Wu, S.1    Sheth, A.2    Miller, J.3    Luo, Z.4
  • 45
    • 33244454775 scopus 로고    scopus 로고
    • A taxonomy of workflow management systems for grid computing
    • Yu, J., R. Buyya. 2005. A taxonomy of workflow management systems for grid computing. J. Grid Comput. 3(3-4) 171-200.
    • (2005) J. Grid Comput. , vol.3 , Issue.3-4 , pp. 171-200
    • Yu, J.1    Buyya, R.2
  • 46
    • 33947504537 scopus 로고    scopus 로고
    • Scheduling scientific workflow applications with deadline and budget constraints using genetic algorithms
    • Yu, J., R. Buyya. 2006. Scheduling scientific workflow applications with deadline and budget constraints using genetic algorithms. Sci. Programming J. 14(3-4) 217-230.
    • (2006) Sci. Programming J. , vol.14 , Issue.3-4 , pp. 217-230
    • Yu, J.1    Buyya, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.