kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Privacy preserving business process matching
KTH, School of Computer Science and Communication (CSC), Theoretical Computer Science, TCS.ORCID iD: 0000-0002-0074-8786
KTH, School of Computer Science and Communication (CSC), Theoretical Computer Science, TCS.ORCID iD: 0000-0002-8069-6495
2015 (English)In: 2015 13th Annual Conference on Privacy, Security and Trust, IEEE , 2015, p. 36-43Conference paper, Published paper (Refereed)
Resource type
Text
Abstract [en]

Business process matching is the activity of checking whether a given business process can interoperate with another one in a correct manner. In case the check fails, it is desirable to obtain information about how the first process can be corrected with as few modifications as possible to achieve interoperability. In case the two business processes belong to two separate enterprises that want to build a virtual enterprise, business process matching based on revealing the business processes poses a clear threat to privacy, as it may expose sensitive information about the inner operation of the enterprises. In this paper we propose a solution to this problem for business processes described by means of service automata. We propose a measure for similarity between service automata and use this measure to devise an algorithm that constructs the most similar automaton to the first one that can interoperate with the second one. To achieve privacy, we implement this algorithm in the programming language SecreC, executing on the Sharemind platform for secure multiparty computation. As a result, only the correction information is leaked to the first enterprise and no more.

Place, publisher, year, edition, pages
IEEE , 2015. p. 36-43
Keywords [en]
Automata theory, Virtual corporation, Business Process, Privacy preserving, Secure multi-party computation, Sensitive informations, Service automata, Virtual enterprise, Data privacy
National Category
Information Systems
Identifiers
URN: urn:nbn:se:kth:diva-187122DOI: 10.1109/PST.2015.7232952ISI: 000375692700006Scopus ID: 2-s2.0-84958659600ISBN: 978-146737828-4 (print)OAI: oai:DiVA.org:kth-187122DiVA, id: diva2:929549
Conference
13th Annual Conference on Privacy, Security and Trust, PST 2015; Izmir; Turkey
Note

QC 20160519

Available from: 2016-05-19 Created: 2016-05-17 Last updated: 2024-03-18Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Gurov, DilianGuanciale, Roberto

Search in DiVA

By author/editor
Gurov, DilianGuanciale, Roberto
By organisation
Theoretical Computer Science, TCS
Information Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 113 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf