DocumentCode :
3129319
Title :
The consistency of task-based authorization constraints in workflow
Author :
Tan, Kaijun ; Crampton, Jason ; Gunter, Carl A.
Author_Institution :
Dept. of Comput. Sci., Pennsylvania Univ., Philadelphia, PA, USA
fYear :
2004
fDate :
28-30 June 2004
Firstpage :
155
Lastpage :
169
Abstract :
Workflow management systems (WFMSs) have attracted a lot of interest both in academia and the business community. A workflow consists of a collection of tasks that are organized to facilitate some business process specification. To simplify the complexity of security administration, it is common to use role-based access control (RBAC) to grant authorization to roles and users. Typically, security policies are expressed as constraints on users, roles, tasks and the workflow itself. A workflow system can become very complex and involve several organizations or different units of an organization, thus the number of security policies may be very large and their interactions very complex. It is clearly important to know whether the existence of such constraints will prevent certain instances of the workflow from completing. Unfortunately, no existing constraint models have considered this problem satisfactorily. In this paper, we define a model for constrained workflow systems that includes local and global cardinality constraints, separation of duty constraints and binding of duty constraints. We define the notion of a workflow specification and of a constrained workflow authorization schema. Our main result is to establish necessary and sufficient conditions for the set of constraints that ensure a sound constrained workflow authorization schema, that is, for any user or any role who are authorized to a task, there is at least one complete workflow instance when this user or this role executes this task.
Keywords :
authorisation; computational complexity; constraint handling; formal specification; workflow management software; business process specification; cardinality constraints; constraint model; duty constraints; role-based access control; security administration complexity; security policies; task-based authorization constraints; workflow authorization; workflow management systems; workflow specification; workflow system constraints; Access control; Authorization; Automation; Business process re-engineering; Computer science; History; Information security; Permission; Sufficient conditions; Workflow management software;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations Workshop, 2004. Proceedings. 17th IEEE
ISSN :
1063-6900
Print_ISBN :
0-7695-2169-X
Type :
conf
DOI :
10.1109/CSFW.2004.1310739
Filename :
1310739
Link To Document :
بازگشت