Automatically finding execution scenarios to deploy security-sensitive workflows
Pub. online: 5 September 2023
Type: Research Article
Published
5 September 2023
5 September 2023
Abstract
We introduce a new class of analysis problems, called Scenario Finding Problems (SFPs), for security-sensitive business processes that – besides execution constraints on tasks – define access control policies (constraining which users can execute which tasks) and authorization constraints (such as Separation of Duty). The solutions to SFPs are concrete execution scenarios that assist customers in the reuse and deployment of security-sensitive workflows. We study the relationship of SFPs to well-known properties of security-sensitive processes such as Workflow Satisfiability and Resiliency together with their complexity. Finally, we present a symbolic approach to solving SFPs and describe our experience with a prototype implementation on real-world business process models taken from an on-line library.
References
E. Bertino, E. Ferrari and V. Atluri, The specification and enforcement of authorization constraints in workflow management systems, TISSEC 2 (1999), 65–104. doi:10.1145/300830.300837.
J. Crampton, M. Huth and J. Kuo, Authorized workflow schemas: Deciding realizability through LTL(F) model checking, STTT 16(1) (2014), 31–48. doi:10.1007/s10009-012-0269-3.
H. Huang, F. Shang, J. Liu and H. Du, Handling least privilege problem and role mining in rbac, Journal of Combinatorial Optimization 30(1) (2013), 63–86. doi:10.1007/s10878-013-9633-9.
A. Koschmider, M. Fellmann, A. Schoknecht and A. Oberweis, Analysis of process model reuse: Where are we now, where should we go from here?, Decision Support Systems 66(0) (2014), 9–19. doi:10.1016/j.dss.2014.05.012.
N. Li, Q. Wang and M. Tripunitara, Resiliency policies in access control, TISSEC 12(4) (2009), 20:1–20:34. doi:10.1145/1513601.1513602.
R. Sandhu, V. Bhamidipati and Q. Munawer, The arbac97 model for role-based administration of roles, TISSEC 2(1) (1999), 105–135. doi:10.1145/300830.300839.
R. Sandhu, E. Coyne, H. Feinstein and C. Youmann, Role-based access control models, IEEE Computer 2(29) (1996), 38–47. doi:10.1109/2.485845.
A.U. Shankar, An introduction to assertional reasoning for concurrent systems, ACM Comput. Surv. 25(3) (1993), 225–262. doi:10.1145/158439.158441.
N.H. Zaaboub, L. Makni and H.B. Abdallah, Literature review of reuse in business process modeling, Software & Systems Modeling 13(3) (2014), 975–989. doi:10.1007/s10270-012-0286-4.