{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T07:54:07Z","timestamp":1726041247321},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030278120"},{"type":"electronic","value":"9783030278137"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-27813-7_9","type":"book-chapter","created":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T19:02:41Z","timestamp":1566154961000},"page":"129-144","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Decentralised and Collaborative Auditing of Workflows"],"prefix":"10.1007","author":[{"given":"Antonio","family":"Nehme","sequence":"first","affiliation":[]},{"given":"Vitor","family":"Jesus","sequence":"additional","affiliation":[]},{"given":"Khaled","family":"Mahbub","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Abdallah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,2]]},"reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-642-22633-5_8","volume-title":"Public Key Infrastructures, Services and Applications","author":"R Accorsi","year":"2011","unstructured":"Accorsi, R.: BBox: a distributed secure log architecture. In: Camenisch, J., Lambrinoudakis, C. (eds.) EuroPKI 2010. LNCS, vol. 6711, pp. 109\u2013124. Springer, Heidelberg (2011). \n https:\/\/doi.org\/10.1007\/978-3-642-22633-5_8"},{"issue":"7","key":"9_CR2","doi-asserted-by":"publisher","first-page":"1578","DOI":"10.1016\/j.mcm.2012.06.035","volume":"57","author":"R Accorsi","year":"2013","unstructured":"Accorsi, R.: A secure log architecture to support remote auditing. Math. Comput. Modell. 57(7), 1578\u20131591 (2013)","journal-title":"Math. Comput. Modell."},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Ahsan, M.M., Wahab, A.W.A., Idris, M.Y.I., Khan, S., Bachura, E., Choo, K.K.R.: Class: cloud log assuring soundness and secrecy scheme for cloud forensics. IEEE Trans. Sustain. Comput. (2018)","DOI":"10.1109\/TSUSC.2018.2833502"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Alqahtani, S., Gamble, R.: Embedding a distributed auditing mechanism in the service cloud. In: 2014 IEEE World Congress on Services, pp. 69\u201376, June 2014","DOI":"10.1109\/SERVICES.2014.22"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Aravind, A., Sandeep, A.: Workflow signature for business process domain: a new solution using IBMKD. In: 2015 Global Conference on Communication Technologies (GCCT), pp. 619\u2013622. IEEE (2015)","DOI":"10.1109\/GCCT.2015.7342736"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Bates, A., et al.: Transparent web service auditing via network provenance functions. In: Proceedings of the 26th International Conference on World Wide Web, pp. 887\u2013895. International World Wide Web Conferences Steering Committee (2017)","DOI":"10.1145\/3038912.3052640"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Flores, D.A.: An authentication and auditing architecture for enhancing security on egovernment services. In: 2014 First International Conference on eDemocracy eGovernment (ICEDEG), pp. 73\u201376 April 2014)","DOI":"10.1109\/ICEDEG.2014.6819952"},{"issue":"4","key":"9_CR8","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MIC.2011.51","volume":"15","author":"R Gajanayake","year":"2011","unstructured":"Gajanayake, R., Iannella, R., Sahama, T.: Sharing with care: an information accountability perspective. IEEE Internet Comput. 15(4), 31\u201338 (2011)","journal-title":"IEEE Internet Comput."},{"key":"9_CR9","unstructured":"Goseva-Popstojanova, K., Li, F., Wang, X., Sangle, A.: A contribution towards solving the web workload puzzle. In: International Conference on Dependable Systems and Networks (DSN 2006), pp. 505\u2013516. IEEE (2006)"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Hale, M.L., Gamble, M.T., Gamble, R.F.: A design and verification framework for service composition in the cloud. In: 2013 IEEE Ninth World Congress on Services, pp. 317\u2013324, June 2013","DOI":"10.1109\/SERVICES.2013.46"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Kuntze, N., Rudolph, C.: Secure digital chains of evidence. In: 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), pp. 1\u20138. IEEE (2011)","DOI":"10.1109\/SADFE.2011.16"},{"issue":"5","key":"9_CR12","first-page":"756","volume":"9","author":"HW Lim","year":"2012","unstructured":"Lim, H.W., Kerschbaum, F., Wang, H.: Workflow signatures for business process compliance. IEEE Trans. Dependable Secur. Comput. 9(5), 756\u2013769 (2012)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Nami, M.R., Malekpour, A.: Application of self-managing properties in virtual organizations. In: 2008 International Symposium on Computer Science and its Applications, CSA 2008, pp. 13\u201316. IEEE (2008)","DOI":"10.1109\/CSA.2008.73"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Paxson, V.: Empirically-derived analytic models of wide-area TCP connections (1993)","DOI":"10.1109\/90.330413"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Rajalakshmi, J.R., Rathinraj, M., Braveen, M.: Anonymizing log management process for secure logging in the cloud. In: 2014 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2014], pp. 1559\u20131564, March 2014","DOI":"10.1109\/ICCPCT.2014.7055014"},{"issue":"2","key":"9_CR16","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1109\/JSYST.2012.2221958","volume":"7","author":"I Ray","year":"2013","unstructured":"Ray, I., Belyaev, K., Strizhov, M., Mulamba, D., Rajaram, M.: Secure logging as a service-delegating log management to the cloud. IEEE Syst. J. 7(2), 323\u2013334 (2013)","journal-title":"IEEE Syst. J."},{"key":"9_CR17","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.entcs.2009.03.013","volume":"236","author":"C Rudolph","year":"2009","unstructured":"Rudolph, C., Kuntze, N., Velikova, Z.: Secure web service workflow execution. Electron. Notes Theor. Comput. Sci. 236, 33\u201346 (2009)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"issue":"11","key":"9_CR18","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"issue":"4","key":"9_CR19","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1109\/TDSC.2012.26","volume":"9","author":"S Sundareswaran","year":"2012","unstructured":"Sundareswaran, S., Squicciarini, A.C., Lin, D.: Ensuring distributed accountability for data sharing in the cloud. IEEE Trans. Dependable Secur. Comput. 9(4), 556\u2013568 (2012)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"9_CR20","unstructured":"Tian, F.: A supply chain traceability system for food safety based on HACCP, blockchain & internet of things. In: 2017 International Conference on Service Systems and Service Management (ICSSSM), pp. 1\u20136. IEEE (2017)"},{"issue":"8","key":"9_CR21","doi-asserted-by":"publisher","first-page":"2175","DOI":"10.1007\/s00500-016-2311-y","volume":"21","author":"H Tian","year":"2017","unstructured":"Tian, H., et al.: Enabling public auditability for operation behaviors in cloud storage. Soft. Comput. 21(8), 2175\u20132187 (2017)","journal-title":"Soft. Comput."},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Velikova, Z., Sch\u00fctte, J., Kuntze, N.: Towards security in decentralized workflows. In: 2009 International Conference on Ultra Modern Telecommunications & Workshops, ICUMT 2009, pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/ICUMT.2009.5345606"},{"key":"9_CR23","unstructured":"Waters, B.R., Balfanz, D., Durfee, G., Smetters, D.K.: Building an encrypted and searchable audit log. In: NDSS, vol. 4, pp. 5\u20136 (2004)"},{"key":"9_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-319-45348-4_19","volume-title":"Business Process Management","author":"I Weber","year":"2016","unstructured":"Weber, I., Xu, X., Riveret, R., Governatori, G., Ponomarev, A., Mendling, J.: Untrusted business process monitoring and execution using blockchain. In: La Rosa, M., Loos, P., Pastor, O. (eds.) BPM 2016. LNCS, vol. 9850, pp. 329\u2013347. Springer, Cham (2016). \n https:\/\/doi.org\/10.1007\/978-3-319-45348-4_19"},{"issue":"6","key":"9_CR25","doi-asserted-by":"publisher","first-page":"820","DOI":"10.1109\/TSC.2015.2457907","volume":"8","author":"M Werner","year":"2015","unstructured":"Werner, M., Gehrke, N.: Multilevel process mining for financial audits. IEEE Trans. Serv. Comput. 8(6), 820\u2013832 (2015)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Wouters, K., Simoens, K., Lathouwers, D., Preneel, B.: Secure and privacy-friendly logging for egovernment services. In: 2008 Third International Conference on Availability, Reliability and Security, pp. 1091\u20131096, March 2008","DOI":"10.1109\/ARES.2008.41"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Yao, J., Chen, S., Wang, C., Levy, D., Zic, J.: Accountability as a service for the cloud: from concept to implementation with BPEL. In: 2010 6th World Congress on Services (SERVICES-1), pp. 91\u201398. IEEE (2010)","DOI":"10.1109\/SERVICES.2010.79"},{"issue":"2","key":"9_CR28","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/TDSC.2015.2482484","volume":"13","author":"S Zawoad","year":"2016","unstructured":"Zawoad, S., Dutta, A., Hasan, R.: Towards building forensics enabled cloud through secure logging-as-a-service. IEEE Trans. Dependable Secur. Comput. 13(2), 148\u2013162 (2016)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Zawoad, S., Dutta, A.K., Hasan, R.: SecLaaS: secure logging-as-a-service for cloud forensics. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 219\u2013230. ACM (2013)","DOI":"10.1145\/2484313.2484342"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-27813-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T19:14:52Z","timestamp":1566155692000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-27813-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030278120","9783030278137"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-27813-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"2 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"TrustBus","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Trust and Privacy in Digital Business","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Linz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"trustbus2019a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dexa.org\/trustbus2019","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mixed (single-blind and double-blind)","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ConfDriver","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2-3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}