An approach to capture authorisation requirements in business processes

被引:17
作者
Wolter, Christian [1 ]
Meinel, Christoph [2 ]
机构
[1] Bombardier Transportat, D-10785 Berlin, Germany
[2] Hasso Plattner Inst, D-14482 Potsdam, Germany
关键词
Business process management; Authorisation requirement; Process modelling; Access control; Verification; SECURITY;
D O I
10.1007/s00766-010-0103-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Business process modelling focuses on the modelling of functional behaviour. In this article, we propose an extension for the business process modelling notation to express non-functional authorisations requirements in a process model to enable the collaboration between security experts and business analysts. To capture multi-level, role-based and Separation of Duty authorisation requirements, new model element attributes and authorisation artefacts are introduced. To enhance the usability of this approach, simple visual decorators are specified to ease the communication of requirements between various stakeholders. To provide an early validation of these authorisation requirements during the definition of a process model, formal semantics are applied to the process model and model-checking techniques are used to provide feedback. As a pragmatic proof-of-concepts, a first prototype implementation is briefly discussed.
引用
收藏
页码:359 / 373
页数:15
相关论文
共 42 条
[1]   Process mapping: One of three, new, special quality tools for management, quality and all other professionals [J].
Anjard, RP .
MICROELECTRONICS AND RELIABILITY, 1996, 36 (02) :223-225
[2]  
[Anonymous], 2006, Assessment of Access Control Systems
[3]  
Atluri V., 2001, P CCS PHIL PA USA, P48, DOI 10.1145/501983.501991
[4]  
BELL DE, 2005, ACSAC 05, P337
[5]   Separation of duties for access control enforcement in workflow environments [J].
Botha, RA ;
Eloff, JHP .
IBM SYSTEMS JOURNAL, 2001, 40 (03) :666-682
[6]  
Business Process Modeling Notation Specification, 2006, BUS PROC MOD NOT SPE
[7]  
Chen K., 2007, COMMUN IIMA, V7, P41
[8]  
Clark D. D., 1987, Proceedings of the 1987 IEEE Symposium on Security and Privacy (Cat. No.87CH2416-6), P184
[9]  
Di Renzo B., 2007, Software Process Improvement and Practice, V12, P231, DOI 10.1002/spip.322
[10]  
Dumas Marlon., 2001, ≪ UML≫ 2001-The Unified Modeling Language. Modeling Languages, Concepts, P76, DOI DOI 10.1007/3-540-45441-1