A Petri Net Based Safety Analysis of Workflow Authorization Models

نویسندگان

  • Vijayalakshmi Atluri
  • Wei-kuang Huang
چکیده

Workflow Management Systems (WFMS) are being widely used today by organizations to coordinate the execution of various applications representing their day-to-day tasks. To ensure that these tasks are executed by authorized users or processes (subjects), and to make sure that authorized subjects gain access on the required objects only during the execution of the specific task, granting and revoking of privileges need to be synchronized with the progression of the workflow through proper authorization mechanisms. Recently, Atluri and Huang have proposed a workflow authorization model (WAM) that provides such synchronization. This paper, first extends WAM to support roles and authorization constraints such as separation of duties. Second, it develops methodologies to analyze the safety of workflow authorization model when authorization constraints are imposed. The analysis is carried out by modeling WAM as a suitable Petri net (PN) and by utilizing the well-established analysis techniques of PNs.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modeling and analyzing the impact of authorization on workflow executions

It has been a subject of a significant amount of research to automate the execution of workflows (or business processes) on computer resources. However, many workflow scenarios still require human involvement, which introduces additional security and authorization concerns. This paper presents a novel mechanism for modeling the execution of workflows with human involvement under Rolebased Autho...

متن کامل

Dynamic configuration and collaborative scheduling in supply chains based on scalable multi-agent architecture

Due to diversified and frequently changing demands from customers, technological advances and global competition, manufacturers rely on collaboration with their business partners to share costs, risks and expertise. How to take advantage of advancement of technologies to effectively support operations and create competitive advantage is critical for manufacturers to survive. To respond to these...

متن کامل

Dynamic Workflows for Grid Applications

In the Grid computing community, there are several approaches to execute not only single tasks on single Grid resources but also to support workflow schemes that enable the composition and execution of complex Grid applications. The most commonly used workflow model for this purpose is the Directed Acyclic Graph (DAG). Within the establishment of the Fraunhofer Resource Grid, we developed a Gri...

متن کامل

Enforcing Mandatory and Discretionary Security in Workflow Management Systems

Workkow management systems (WFMS) support the modeling and coordinated execution of processes within an organization. As advances in workkow management take place, they are also required to support security. This paper makes two major contributions to the area of workkow management. First, it shows how both mandatory and discretionary security can be incorporated into WFMS. Second, it provides ...

متن کامل

Soccer Goalkeeper Task Modeling and Analysis by Petri Nets

In a robotic soccer team, goalkeeper is an important challenging role, which has different characteristics from the other teammates. This paper proposes a new learning-based behavior model for a soccer goalkeeper robot by using Petri nets. The model focuses on modeling and analyzing, both qualitatively and quantitatively, for the goalkeeper role so that we have a model-based knowledge of the ta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Journal of Computer Security

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2000