Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Binding of Duty (BoD)

Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance
The requirement that an entity performing an action is bound to perform another action.
Published in Chapter:
Privacy Compliance Requirements in Workflow Environments
Maria N. Koukovini (National Technical University of Athens, Greece), Eugenia I. Papagiannakopoulou (National Technical University of Athens, Greece), Georgios V. Lioudakis (National Technical University of Athens, Greece), Nikolaos L. Dellas (SingularLogic S.A., Greece), Dimitra I. Kaklamani (National Technical University of Athens, Greece), and Iakovos S. Venieris (National Technical University of Athens, Greece)
DOI: 10.4018/978-1-4666-6324-4.ch011
Abstract
Workflow management systems are used to run day-to-day applications in numerous domains, often including exchange and processing of sensitive data. Their native “leakage-proneness,” being the consequence of their distributed and collaborative nature, calls for sophisticated mechanisms able to guarantee proper enforcement of the necessary privacy protection measures. Motivated by the principles of Privacy by Design and its potential for workflow environments, this chapter investigates the associated issues, challenges, and requirements. With the legal and regulatory provisions regarding privacy in information systems as a baseline, the chapter elaborates on the challenges and derived requirements in the context of workflow environments, taking into account the particular needs and implications of the latter. Further, it highlights important aspects that need to be considered regarding, on the one hand, the incorporation of privacy-enhancing features in the workflow models themselves and, on the other, the evaluation of the latter against privacy provisions.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Privacy-Aware Access Control
The requirement that an entity performing an action is bound to perform another action.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR