Unified Implementation and Simplification for Task-Based Authorization Security in Workflows

被引:0
|
作者
Zhong, Wenjing [1 ,2 ]
Zhao, Jinjing [2 ]
Hu, Hesuan [1 ,3 ,4 ]
机构
[1] Xidian Univ, Sch Electromech Engn, Xian 710071, Shaanxi, Peoples R China
[2] Natl Key Lab Sci & Technol Informat Syst Secur, Beijing 100101, Peoples R China
[3] Nanyang Technol Univ, Sch Comp Sci & Engn, Coll Engn, Singapore 639798, Singapore
[4] Xi An Jiao Tong Univ, State Key Lab Mfg Syst Engn, Xian 710054, Shaanxi, Peoples R China
关键词
Security; Task analysis; Authorization; Computational modeling; Monitoring; Modeling; Organizations; Workflow management systems; task-based authorization security; implementation and simplification; Petri nets; ACCESS-CONTROL; PETRI NETS; CONSTRAINTS; REQUIREMENTS; ENVIRONMENTS; SEPARATION; MODEL;
D O I
10.1109/TSC.2023.3268651
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authorization-related security requirements are of great significance in workflow management systems. Existing studies are restricted in their scopes of research. There is no unified principle for their implementation. In this paper, we focus on the unification of authorization-related security requirements using Petri nets (PNs). These security requirements are expressed by constraints, being imposed on tasks, namely task-based security requirements (TSRs). By downgrading TSRs to a kind of authorization-conflict relationship, we provide a standardized expression for TSRs. Such a standardized expression can be transformed to firing-based linear inequalities which are a more general representation of constraints. Then, we propose the firing control for the unified implementation of TSRs based on firing-based linear inequalities. In fact, firing control is enforced by structural controllers namely monitors which are structurally consistent with PNs. For the sake of conciseness, simplification techniques are provided for the monitors. Ultimately, the experiments and discussions are presented to show the performance and advantages of the proposed approach.
引用
收藏
页码:3796 / 3811
页数:16
相关论文
共 50 条
  • [31] Implementation of Authentication and Authorization System based on Digital Object Architecture
    Sazonov, Dmitriy
    Kirichek, Ruslan
    Borodin, Alexey
    2019 11TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT), 2019,
  • [32] Enhancing grid security by fine-grained behavioral control and negotiation-based authorization
    Hristo Koshutanski
    Aliaksandr Lazouski
    Fabio Martinelli
    Paolo Mori
    International Journal of Information Security, 2009, 8 : 291 - 314
  • [33] Enhancing grid security by fine-grained behavioral control and negotiation-based authorization
    Koshutanski, Hristo
    Lazouski, Aliaksandr
    Martinelli, Fabio
    Mori, Paolo
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (04) : 291 - 314
  • [34] Integrating an Efficient Authorization Protocol with Trigon-Based Authentication Mechanism for Improving Grid Security
    Ruckmani, V.
    Sadasivam, G. Sudha
    INFORMATION PROCESSING AND MANAGEMENT, 2010, 70 : 125 - +
  • [35] Design, fabrication, and implementation of voxel-based 3D printed textured phantoms for task-based image quality assessment in CT
    Solomon, Justin
    Ba, Alexandre
    Diao, Andrew
    Lo, Joseph
    Bier, Elianna
    Bochud, Francois
    Gehm, Michael
    Samei, Ehsan
    MEDICAL IMAGING 2016: PHYSICS OF MEDICAL IMAGING, 2016, 9783
  • [36] Design and Implementation of a Context-Based Security Model
    Iijima, Tadashi
    Kido, Satoshi
    KNOWLEDGE-BASED SOFTWARE ENGINEERING, JCKBSE 2014, 2014, 466 : 356 - 370
  • [37] Formal Approach for Authorization in Distributed Business Process Related Task Document Role Based Access Control
    Maroua, Nouioua
    Belhassen, Zouari
    Adel, Alti
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1964 - 1970
  • [38] XML security protection scheme based on Kerberos authentication and polynomials authorization
    Guo, Lihong
    Wang, Jian
    Wu, Haitao
    Al-Nabhan, Najla
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2020, 17 (05) : 4609 - 4630
  • [39] An Insight- and Task-based Methodology for Evaluating Spatiotemporal Visual Analytics
    Gomez, Steven R.
    Guo, Hua
    Ziemkiewicz, Caroline
    Laidlaw, David H.
    2014 IEEE CONFERENCE ON VISUAL ANALYTICS SCIENCE AND TECHNOLOGY (VAST), 2014, : 63 - 72
  • [40] A temporal decomposition method for identifying venous effects in task-based fMRI
    Kay, Kendrick
    Jamison, Keith W.
    Zhang, Ru-Yuan
    Ugurbil, Kamil
    NATURE METHODS, 2020, 17 (10) : 1033 - +