SAP and Swinburne Uni target BPM privacy

 

Information on a need-to-know basis.

Researchers from Swinburne University in Melbourne and Brisbane-based SAP Research Centre, are working on a project that will allow Business Process Management software to share information on a need-to-know basis.

Business process management (BPM) applications provide large companies with a single view of all the activities and resources required to create a product or service for a customer.

Often, the products required sharing of information with third parties but it was claimed traditional systems weren't flexible enough to provide data on a need-to-know basis.

Researchers said that meant corporate secrets were often unnecessarily exposed.

Xiaohui Zhao, a postdoctoral fellow at the university and a researcher on the project, dubbed 'Kaleidoscope', said that traditional BPM applications offered only a "share all-or-nothing" option.

"Once the business process is defined, the traditional approach just releases [all the information] to all of the partners. This means that sometimes, confidential or private information will be released," said Zhao.

Professor Chengfei Liu, a program leader at Swinburne Uni's Centre for Complex Software Systems and Services, agreed with Zhao.

"Those kinds of issues are serious and haven't been addressed by previous business process management systems," said Liu.

The project started in July 2007. There was no firm date on when it would be completed.


SAP and Swinburne Uni target BPM privacy
 
 
 
Top Stories
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
The CISO’s dilemma: Do you trust your partner’s partner?
[Blog post] How far down the chain do you check?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 310

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 118

Vote