Model checking authorization requirements in business processes

被引:19
作者
Armando, Alessandro [1 ,2 ]
Ponta, Serena Elisa [3 ]
机构
[1] Univ Genoa, DIBRIS, I-16145 Genoa, Italy
[2] Fdn Bruno Kessler, Secur & Trust Unit, Trento, Italy
[3] SAP Res Sophia Antipolis, Mougins, France
关键词
Model checking; Security-sensitive business process; Authorization requirements; Access control; Organizational control; Automatic security analysis; VERIFICATION;
D O I
10.1016/j.cose.2013.10.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Business processes are usually expected to meet high level authorization requirements (e.g., Separation of Duty). Since violation of authorization requirements may lead to economic losses and/or legal implications, ensuring that a business process meets them is of paramount importance. Previous work showed that model checking can be profitably used to check authorization requirements in business processes. However, building formal models that simultaneously account for both the workflow and the access control policy is a time consuming and error-prone activity. In this paper we present a new approach to model checking authorization requirements in business processes that allows for the separate specification of the workflow and of the associated access control policy while retaining the ability to carry out a fully automatic analysis of the business process. To illustrate the effectiveness of the approach we describe its application to a Loan Origination Process subject to an RBAC access control policy featuring conditional permission assignments and delegation. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1 / 22
页数:22
相关论文
共 45 条
[1]  
[Anonymous], 2009, BUS PROC MOD NOT BPM
[2]  
[Anonymous], 2007, WEB SERVICES BUSINES
[3]  
[Anonymous], 2008, Proceedings of the 6th ACMWorkshop on FormalMethods in Security Engineering. FMSE '08
[4]   SATMC: A SAT-based model checker for security protocols [J].
Armando, A ;
Compagna, L .
LOGICS IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2004, 3229 :730-733
[5]  
Armando A, 2005, CAV 05
[6]  
Armando A, 2007, INT J INFORM SECURIT
[7]   LTL model checking for security Protocols [J].
Armando, Alessandro ;
Carbone, Roberto ;
Compagna, Luca .
20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS, 2007, :385-+
[8]  
Armando A, 2012, LECT NOTES COMPUT SC, V7214, P267, DOI 10.1007/978-3-642-28756-5_19
[9]  
Armando A, 2010, LECT NOTES COMPUT SC, V5983, P66
[10]  
Arsac W, 2011, LECT NOTES COMPUT SC, V6542, P29, DOI 10.1007/978-3-642-19125-1_3