Unified Implementation and Simplification for Task-Based Authorization Security in Workflows

被引:0
|
作者
Zhong, Wenjing [1 ,2 ]
Zhao, Jinjing [2 ]
Hu, Hesuan [1 ,3 ,4 ]
机构
[1] Xidian Univ, Sch Electromech Engn, Xian 710071, Shaanxi, Peoples R China
[2] Natl Key Lab Sci & Technol Informat Syst Secur, Beijing 100101, Peoples R China
[3] Nanyang Technol Univ, Sch Comp Sci & Engn, Coll Engn, Singapore 639798, Singapore
[4] Xi An Jiao Tong Univ, State Key Lab Mfg Syst Engn, Xian 710054, Shaanxi, Peoples R China
关键词
Security; Task analysis; Authorization; Computational modeling; Monitoring; Modeling; Organizations; Workflow management systems; task-based authorization security; implementation and simplification; Petri nets; ACCESS-CONTROL; PETRI NETS; CONSTRAINTS; REQUIREMENTS; ENVIRONMENTS; SEPARATION; MODEL;
D O I
10.1109/TSC.2023.3268651
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authorization-related security requirements are of great significance in workflow management systems. Existing studies are restricted in their scopes of research. There is no unified principle for their implementation. In this paper, we focus on the unification of authorization-related security requirements using Petri nets (PNs). These security requirements are expressed by constraints, being imposed on tasks, namely task-based security requirements (TSRs). By downgrading TSRs to a kind of authorization-conflict relationship, we provide a standardized expression for TSRs. Such a standardized expression can be transformed to firing-based linear inequalities which are a more general representation of constraints. Then, we propose the firing control for the unified implementation of TSRs based on firing-based linear inequalities. In fact, firing control is enforced by structural controllers namely monitors which are structurally consistent with PNs. For the sake of conciseness, simplification techniques are provided for the monitors. Ultimately, the experiments and discussions are presented to show the performance and advantages of the proposed approach.
引用
收藏
页码:3796 / 3811
页数:16
相关论文
共 50 条
  • [1] Beacon-Based Firing Control for Authorization Security in Workflows
    Zhong, Wenjing
    Zhao, Jinjing
    Hu, Hesuan
    IEEE TRANSACTIONS ON RELIABILITY, 2023, 72 (04) : 1594 - 1609
  • [2] A Decentralized Authorization and Security Framework for Distributed Research Workflows
    Cardone, Richard
    Padhy, Smruti
    Black, Steve
    Stubbs, Joe
    Cleveland, Sean
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 741 - 746
  • [3] An Immunology-Based Security System Model for Authorization
    Liu, Tong
    Wang, Yazhe
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1033 - 1037
  • [4] Modeling Multiclass Task-Based Applications on Heterogeneous Distributed Environments
    Pinciroli, Riccardo
    Gribaudo, Marco
    Serazzi, Giuseppe
    ANALYTICAL AND STOCHASTIC MODELLING TECHNIQUES AND APPLICATIONS, ASMTA 2017, 2017, 10378 : 166 - 180
  • [5] A survey of authorization based active networks security
    Tang, Y
    Gong, YF
    2004 INTERNATIONAL CONFERENCE ON COMMUNICATION, CIRCUITS, AND SYSTEMS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS - VOL 2: SIGNAL PROCESSING, CIRCUITS AND SYSTEMS, 2004, : 22 - 24
  • [6] A task-based taxonomy of erroneous human behavior
    Bolton, Matthew L.
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2017, 108 : 105 - 121
  • [7] Task-Based Analog-to-Digital Converters
    Neuhaus, Peter
    Shlezinger, Nir
    Doerpinghaus, Meik
    Eldar, Yonina C.
    Fettweis, Gerhard
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2021, 69 : 5403 - 5418
  • [8] Petri Net Based Resource Modeling and Analysis of Workflows with Task Failures
    Wang, Jiacun
    2013 10TH IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2013, : 655 - 659
  • [9] Task-Based Solutions to Embedded Index Coding
    Haviv, Ishay
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (10) : 6144 - 6149
  • [10] Design and Implementation of Authorization System Based on RBAC
    Li, Furong
    Wu, Haitao
    2015 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS IHMSC 2015, VOL I, 2015, : 502 - 504