%0 Book Section %T Towards Authenticity and Privacy Preserving Accountable Workflows %+ Graz University of Technology [Graz] (TU Graz) %+ University of Passau %A Derler, David %A Hanser, Christian %A Pöhls, Henrich, C. %A Slamanig, Daniel %@ 978-3-319-41762-2 %B Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers %E David Aspinall %E Jan Camenisch %E Marit Hansen %E Simone Fischer-Hübner %E Charles Raab %I Springer International Publishing %S IFIP Advances in Information and Communication Technology %V AICT-476 %P 170-186 %8 2016 %D 2016 %R 10.1007/978-3-319-41763-9_12 %Z Computer Science [cs]Book sections %X Efficient and well structured business processes (and their corresponding workflows) are drivers for the success of modern enterprises. Today, we experience the growing trends to have IT supported workflows and to outsource enterprise IT to the cloud. Especially when executing (interorganizational) business processes on third party infrastructure such as the cloud, the correct execution and documentation become very important issues. To efficiently manage those processes, to immediately detect deviations from the intended workflows and to hold tenants (such as the cloud) accountable in such (decentralized) processes, a mechanism for efficient and accountable monitoring and documentation is highly desirable. Ideally, these features are provided by means of cryptography in contrast to organizational measures.It turns out that variants of malleable signature schemes, i.e., signature schemes where allowed modifications of signed documents do not invalidate the signature, as well as proxy (functional) signature schemes, i.e., signature schemes which allow the delegation of signing rights to other parties, seem to be a useful tool in this context. In this paper, we review the state of the art in this field, abstractly model such workflow scenarios, investigate desirable properties, analyze existing instantiations of aforementioned signature schemes with respect to these properties, and identify interesting directions for future research. %G English %Z TC 9 %Z TC 11 %Z WG 9.2 %Z WG 9.5 %Z WG 9.6 %Z WG 11.7 %Z WG 11.4 %Z WG 11.6 %2 https://inria.hal.science/hal-01619735/document %2 https://inria.hal.science/hal-01619735/file/428330_1_En_12_Chapter.pdf %L hal-01619735 %U https://inria.hal.science/hal-01619735 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC9 %~ IFIP-TC11 %~ IFIP-WG9-2 %~ IFIP-WG9-5 %~ IFIP-WG9-6 %~ IFIP-WG11-7 %~ IFIP-WG11-4 %~ IFIP-WG11-6 %~ IFIP-AICT-476