On the satisfiability of authorization requirements in business process

Yang BO, Chunhe XIA, Zhigang ZHANG, Xinzheng LU

PDF(499 KB)
PDF(499 KB)
Front. Comput. Sci. ›› 2017, Vol. 11 ›› Issue (3) : 528-540. DOI: 10.1007/s11704-016-6016-2
RESEARCH ARTICLE

On the satisfiability of authorization requirements in business process

Author information +
History +

Abstract

Satisfiability problem of authorization requirements in business process asks whether there exists an assignment of users to tasks that satisfies all the requirements, and methods were proposed to solve this problem. However, the proposed methods are inefficient in the sense that a step of the methods is searching all the possible assignments, which is time-consuming. This work proposes a method to solve the satisfiability problem of authorization requirements without browsing the assignments space. Our method uses improved separation of duty algebra (ISoDA) to describe a satisfiability problem of qualification requirements and quantification requirements (Separation of Duty and Binding of Duty requirements). Thereafter, ISoDA expressions are reduced into multi-mutual-exclusive expressions. The satisfiabilities of multi-mutual-exclusive expressions are determined by an efficient algorithm proposed in this study. The experiment shows that our method is faster than the state-of-the-art methods.

Keywords

satisfiability / authorization requirements / separation of duty / binding of duty / business process

Cite this article

Download citation ▾
Yang BO, Chunhe XIA, Zhigang ZHANG, Xinzheng LU. On the satisfiability of authorization requirements in business process. Front. Comput. Sci., 2017, 11(3): 528‒540 https://doi.org/10.1007/s11704-016-6016-2

References

[1]
BeckerJ, Delfmann P, DietrichH-A , SteinhorstM, EggertM. Business process compliance checking —applying and evaluating a generic pattern matching approach for conceptual models in the financial sector. Information Systems Frontiers, 2016, 18(2): 359–405
CrossRef Google scholar
[2]
LyL T, Rinderle-Ma S, KnupleschD , DadamP. Monitoring business process compliance using compliance rule graphs.Lecture Notes in Computer Science, 2011, 7044: 82–99
CrossRef Google scholar
[3]
LyL T, Rinderle S, DadamP . Integration and verification of semantic constraints in adaptive process management systems. Data & Knowledge Engineering, 2008, 64(1): 3–23
CrossRef Google scholar
[4]
LiN H, WangQ H. Beyond separation of duty: an algebra for specifying high-level security policies. Journal of the ACM, 2008, 55(3): 1–46
CrossRef Google scholar
[5]
WolterC, SchaadA. Modeling of task-based authorization constraints in BPMN. In: Proceedings of International Conference on Business Process Management. 2007, 64–79
CrossRef Google scholar
[6]
BertinoE, Ferrari E, AtluriV . An authorization model for supporting the specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information System Security, 1999, 2(1): 65–104
CrossRef Google scholar
[7]
CramptonJ, GutinG, Karapetyan. D . Valued workflow satisfiability problem. In: Proceedings of the 20th ACM Symposium on Access Control Models and Technologies. 2015, 3–13
CrossRef Google scholar
[8]
KarapetyanD, Gagarin A, GutinG . Pattern backtracking algorithm for the workflow satisfiability problem with user-independent constraints. In: Proceedings of the 9th International Workshop on Frontiers in Algorithmics. 2015, 138–149
CrossRef Google scholar
[9]
MaceJ C, Morisset C, Van MoorselA . Modelling user availability in workflow resiliency analysis. In: Proceedings of Symposium and Bootcamp on the Science of Security. 2015, 1–10
CrossRef Google scholar
[10]
CohenD, Crampton J, GagarinA , GutinG, JonesM. Iterative plan construction for the workflow satisfiability problem. Journal of Artificial Intelligence Research, 2014, 51: 555–577
[11]
CramptonJ, GutinG, YeoA. On the parameterized complexity and kernelization of the workflow satisfiability problem. ACM Transactions on Information and System Security, 2012, 16(1): 1518–1527
[12]
CohenD, Crampton J, GagarinA , GutinG, JonesM. Algorithms for the workflow satisfiability problem engineered for counting constraints. Journal of Combinatorial Optimization, 2015: 1–22
[13]
ZhaiZ N, WangG, ZhengZ J. Verification of (≠,=) constrained workflow robustness based on satisfiability counting. Chinese Journal of Electronics, 2015, 43(11): 2298–2304
[14]
BoY, XiaC H, LuoY, Tang Q. Static compliance checking beyond separation of duty constraints. In: Proceedings of the 9th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC). 2014, 171–178
CrossRef Google scholar
[15]
WangQ H, LiN H. Satisfiability and resiliency in workflow authorization systems. ACM Transactions on Information and System Security, 2010, 13(4): 747–759
CrossRef Google scholar
[16]
KohlerM, SchaadA. Avoiding policy-based deadlocks in business processes. In: Proceedings of International Conference on Availability, Reliability and Security. 2008, 709–716
CrossRef Google scholar
[17]
StrembeckM, Mendling J. Generic algorithms for consistency checking of mutual-exclusion and binding constraints in a business process context. Lecture Notes in Computer Science, 2010: 204–221
CrossRef Google scholar
[18]
TanK, Crampton J, GunterC A . The consistency of task-based authorization constraints in workflow systems. In: Proceedings of the 17th IEEE Computer Security Foundations Workshop. 2004, 155–169
[19]
ArmandoA, PontaS E. Model checking authorization requirements in business processes. Computers and Security, 2014, 40(2): 1–22
CrossRef Google scholar
[20]
HoffmannJ, WeberI, GovernatoriG . On compliance checking for clausal constraints in annotated process models. Information Systems Frontiers, 2012, 14(2): 155–177
CrossRef Google scholar
[21]
BasinD, BurriS J, KarjothG. Dynamic enforcement of abstract separation of duty constraints. In: Proceedings of the 14th European Symposium on Research in Computer Security. 2009, 250–267
CrossRef Google scholar
[22]
BarlettaM, RaniseS, ViganoL. Verifying the interplay of authorization policies and workflow in service-oriented architectures. In: Proceedings of the 16th International Conference on Computational Science and Engineering. 2009, 289–296
CrossRef Google scholar
[23]
ArmandoA, PontaS E. Model checking of security-sensitive business processes.Lecture Notes in Computer Science, 2009, 5983: 66–80
CrossRef Google scholar
[24]
RodríguezA, Fernández-Medina E, PiattiniM . A BPMN extension for the modeling of security requirements in business processes. IEICE Transactions on Information and Systems, 2007, 90(4): 745–752
CrossRef Google scholar
[25]
CohenD, Crampton J, GagarinA , GutinG, JonesM. Engineering algorithms for workflow satisfiability problem with user-independent constraints. Lecture Notes in Computer Science, 2014, 8497: 48–59
CrossRef Google scholar

RIGHTS & PERMISSIONS

2016 Higher Education Press and Springer-Verlag Berlin Heidelberg
AI Summary AI Mindmap
PDF(499 KB)

Accesses

Citations

Detail

Sections
Recommended

/