Cerberus: Automated Synthesis of Enforcement Mechanisms for Security-Sensitive Business Processes

نویسندگان

  • Luca Compagna
  • Daniel Ricardo dos Santos
  • Serena Elisa Ponta
  • Silvio Ranise
چکیده

Cerberus is a tool to automatically synthesize run-time enforcement mechanisms for security-sensitive Business Processes (BPs). The tool is capable of guaranteeing that the execution constraints EC on the tasks together with the authorization policy AP and the authorization constraints AC are satisfied while ensuring that the process can successfully terminate. Cerberus can be easily integrated in many workflow management systems, it is transparent to process designers, and does not require any knowledge beyond usual BP modeling. The tool works in two phases. At design-time, the enforcement mechanism M , parametric in the authorization policy AP, is generated from EC and AC; M can thus be used with any instance of the same BP provided that EC and AC are left unchanged. At run-time, a specific authorization policy is added to M , thereby obtaining an enforcement mechanism M∗ dedicated to a particular instance of the security-sensitive business process. To validate our approach, we discuss the implementation and usage of Cerberus in the SAP HANA Operational Intelligence platform.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

Detective Information Flow Analysis for Business Processes

We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling a forensic investigation, our approach aims at analyzing the audit trails resultant from the execution of the business processes, locating informations flows that violate the (non-functional) requirements stipulated by security...

متن کامل

Enforcement of entailment constraints in distributed service-based business processes☆

CONTEXT A distributed business process is executed in a distributed computing environment. The service-oriented architecture (SOA) paradigm is a popular option for the integration of software services and execution of distributed business processes. Entailment constraints, such as mutual exclusion and binding constraints, are important means to control process execution. Mutually exclusive task...

متن کامل

Concept drift detection in business process logs using deep learning

Process mining provides a bridge between process modeling and analysis on the one hand and data mining on the other hand. Process mining aims at discovering, monitoring, and improving real processes by extracting knowledge from event logs. However, as most business processes change over time (e.g. the effects of new legislation, seasonal effects and etc.), traditional process mining techniques ...

متن کامل

Synthesis of Secure Systems

This thesis concerns the study, the development and the synthesis of mechanisms forensuring the security of complex systems, i.e., systems composed by several interactivecomponents.A complex system under analysis is described as an open system, in which a certaincomponent has an unspecified behavior (not fixed in advance). Regardless of the unspec-ified behavior, the system ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016