TRUSTED INFORMATION PROCESSES IN B2B NETWORKS

Chintan Doshi, Liam Peyton

2008

Abstract

The design, implementation and management of inter-organizational business processes that operate across the Internet have to address a number of issues that do not normally arise for business processes that operate solely within an organization. A framework is needed which supports traditional business process management and which also has the technical infrastructure in place to address federated identity management, privacy compliance and performance management. In this paper, we examine how this can be accomplished in an architecture with built in event logging and privacy auditing that deploys processes defined in the Business Process Execution Language standard (BPEL) into a "Circle of Trust" (CoT) architecture as specified by the Liberty Alliance standard for federated identity management. A sample business process scenario is implemented in the proposed framework and evaluated.

Download


Paper Citation


in Harvard Style

Doshi C. and Peyton L. (2008). TRUSTED INFORMATION PROCESSES IN B2B NETWORKS . In Proceedings of the Tenth International Conference on Enterprise Information Systems - Volume 4: ICEIS, ISBN 978-989-8111-39-5, pages 37-44. DOI: 10.5220/0001714500370044

in Bibtex Style

@conference{iceis08,
author={Chintan Doshi and Liam Peyton},
title={TRUSTED INFORMATION PROCESSES IN B2B NETWORKS},
booktitle={Proceedings of the Tenth International Conference on Enterprise Information Systems - Volume 4: ICEIS,},
year={2008},
pages={37-44},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001714500370044},
isbn={978-989-8111-39-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Tenth International Conference on Enterprise Information Systems - Volume 4: ICEIS,
TI - TRUSTED INFORMATION PROCESSES IN B2B NETWORKS
SN - 978-989-8111-39-5
AU - Doshi C.
AU - Peyton L.
PY - 2008
SP - 37
EP - 44
DO - 10.5220/0001714500370044