Unified Implementation and Simplification for Task-Based Authorization Security in Workflows

被引:0
|
作者
Zhong, Wenjing [1 ,2 ]
Zhao, Jinjing [2 ]
Hu, Hesuan [1 ,3 ,4 ]
机构
[1] Xidian Univ, Sch Electromech Engn, Xian 710071, Shaanxi, Peoples R China
[2] Natl Key Lab Sci & Technol Informat Syst Secur, Beijing 100101, Peoples R China
[3] Nanyang Technol Univ, Sch Comp Sci & Engn, Coll Engn, Singapore 639798, Singapore
[4] Xi An Jiao Tong Univ, State Key Lab Mfg Syst Engn, Xian 710054, Shaanxi, Peoples R China
关键词
Security; Task analysis; Authorization; Computational modeling; Monitoring; Modeling; Organizations; Workflow management systems; task-based authorization security; implementation and simplification; Petri nets; ACCESS-CONTROL; PETRI NETS; CONSTRAINTS; REQUIREMENTS; ENVIRONMENTS; SEPARATION; MODEL;
D O I
10.1109/TSC.2023.3268651
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authorization-related security requirements are of great significance in workflow management systems. Existing studies are restricted in their scopes of research. There is no unified principle for their implementation. In this paper, we focus on the unification of authorization-related security requirements using Petri nets (PNs). These security requirements are expressed by constraints, being imposed on tasks, namely task-based security requirements (TSRs). By downgrading TSRs to a kind of authorization-conflict relationship, we provide a standardized expression for TSRs. Such a standardized expression can be transformed to firing-based linear inequalities which are a more general representation of constraints. Then, we propose the firing control for the unified implementation of TSRs based on firing-based linear inequalities. In fact, firing control is enforced by structural controllers namely monitors which are structurally consistent with PNs. For the sake of conciseness, simplification techniques are provided for the monitors. Ultimately, the experiments and discussions are presented to show the performance and advantages of the proposed approach.
引用
收藏
页码:3796 / 3811
页数:16
相关论文
共 50 条
  • [1] Modeling of task-based authorization constraints in BPMN
    Wolter, Christian
    Schaad, Andreas
    BUSINESS PROCESS MANAGEMENT, PROCEEDINGS, 2007, 4714 : 64 - +
  • [2] The consistency of task-based authorization constraints in workflow systems
    Tan, KJ
    Crampton, J
    Gunter, CA
    17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, : 155 - 169
  • [3] Enhancing iteration performance on distributed task-based workflows
    Barcelo, Alex
    Queralt, Anna
    Cortes, Toni
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 149 : 359 - 375
  • [4] Beacon-Based Firing Control for Authorization Security in Workflows
    Zhong, Wenjing
    Zhao, Jinjing
    Hu, Hesuan
    IEEE TRANSACTIONS ON RELIABILITY, 2023, 72 (04) : 1594 - 1609
  • [5] A framework for the implementation of task-based instruction
    Skehan, P
    APPLIED LINGUISTICS, 1996, 17 (01) : 38 - 62
  • [6] Enforcing Security Properties in Task-based Systems
    Irwin, Keith
    Yu, Ting
    Winsborough, William H.
    SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 41 - 50
  • [8] A Programming Model for Hybrid Workflows: combining Task-based Workflows and Dataflows all-in-one
    Ramon-Cortes, Cristian
    Lordan, Francesc
    Ejarque, Jorge
    Badia, Rosa M.
    arXiv, 2020,
  • [9] A programming model for Hybrid Workflows: Combining task-based workflows and dataflows all-in-one
    Ramon-Cortes, Cristian
    Lordan, Francesc
    Ejarque, Jorge
    Badia, Rosa M.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 113 : 281 - 297
  • [10] A UNIFIED TASK-BASED DEPENDABILITY MODEL FOR HYPERCUBE COMPUTERS
    DAS, CR
    KIM, J
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 1992, 3 (03) : 312 - 324