@inbook{altunay_brown_byrd_dean_2005, series={Lecture Notes in Computer Science}, title={Trust-Based Secure Workflow Path Construction}, volume={3826}, ISBN={9783540749738 9783540749745}, ISSN={0302-9743 1611-3349}, url={http://dx.doi.org/10.1007/11596141_29}, DOI={10.1007/11596141_29}, abstractNote={Security and trust relationships between services significantly govern their willingness to collaborate and participate in a workflow. Existing workflow tools do not consider such relationships as an integral part of their planning logic: rather, they approach security as a run-time issue. We present a workflow management framework that fully integrates trust and security into the workflow planning logic. It considers not only trust relationships between the workflow requestor and individual services, but also trust relationships among the services themselves. It allows each service owner to define an upper layer of collaboration policies (rules that specify the terms under which participation in a workflow is allowed) and integrates them into the planning logic. Services that are unfit for collaboration due to security violations are replaced at the planning stage. This approach increases the services owners’ control over the workflow path, their willingness for collaboration, and avoids run-time security failures.}, booktitle={Service-Oriented Computing – ICSOC 2007}, publisher={Springer Berlin Heidelberg}, author={Altunay, M. and Brown, D. and Byrd, G. and Dean, R.}, editor={Benatallah, B. and Casati, F. and Traverso, P.Editors}, year={2005}, pages={382–395}, collection={Lecture Notes in Computer Science} }