Using Workflow to Enhance Security in Federated Databases

  • Martin S. Olivier
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT)


A workflow system automates processes that occur during the daily operation of an organisation. The description of such a process inherently includes information about who needs to perform each step. It also includes information about when this subject has to perform that step. This information can be used to enhance security in the system. In particular the when information can be used to dynamically adapt security according to the current state of the workflow process.


Distributed Systems—Distributed databases Heterogeneous Databases Security and Protection Keyword Codes: C2. H2.5 K6.5 


  1. Bock, G.E. and Marca, D.A. (1995) Designing Groupware: A Guidebook for Designers, Implementors, and Users. McGraw-Hill, New York, New York.Google Scholar
  2. Kim, W., ed. (1995) Modern Database Systems: The Object Model, Interoperability and Beyond. ACM Press, New York, New York.zbMATHGoogle Scholar
  3. Lunt, T.F. (1995) Authorization in Object-Oriented Databases, in Modern Database Systems: The Object Model, Interoperability and Beyond (ed. W. Kim) ACM Press, New York, New York, 130–45.Google Scholar
  4. Olivier, M.S. and Von Solms, S.H. (1994) A Taxonomy for Secure Object-oriented Databases. ACM Transactions on Database Systems, 19, 1, 3–46.CrossRefGoogle Scholar
  5. Olivier, M.S. (1995) Self-protecting Objects in a Secure Federated Database. Ninth IFIP WG 11. 3 Conference on Database Security, Rensselaerville, New York.Google Scholar
  6. Olivier, M.S. (1996a) Supporting Site Security Policies for Members of Federated Databases. Fourth European Conference on Information Systems, Lisbon.Google Scholar
  7. Olivier, M.S. (1996b) Integrity Constraints in Federated Databases. Submitted.Google Scholar
  8. Ozsu,M.T. and Valduriez,P.(1991) Principles of Distributed Database Systems. Prentice-Hall,Englewood Cliffs,New Jersey.Google Scholar
  9. Rabitti, F., Bertino, E., Kim, W. and Woelk, D. (1991) A Model of Authorization for Next-Generation Database Systems. ACM Transactions on Database Systems, 16, 1, 88–131.CrossRefGoogle Scholar
  10. Sheth, A.P. and Larson, J.A. (1990) Federated Database Systems for Managing Distributed, Heterogeneous, and Autonomous Databases. ACM Computing Surveys, 22, 3, 183–236.CrossRefGoogle Scholar
  11. Thuraisingham, B. (1994) Security issues for federated database systems. Computers 6 Security, 13, 509–25.CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 1996

Authors and Affiliations

  • Martin S. Olivier
    • 1
  1. 1.Department of Computer ScienceRand Afrikaans UniversityJohannesburgSouth Africa

Personalised recommendations