Enforcing Mandatory and Discretionary Security in Workflow Management Systems
نویسندگان
چکیده
Workkow management systems (WFMS) support the modeling and coordinated execution of processes within an organization. As advances in workkow management take place, they are also required to support security. This paper makes two major contributions to the area of workkow management. First, it shows how both mandatory and discretionary security can be incorporated into WFMS. Second, it provides a formal framework, based on Petri nets (PNs), for modeling workkows. Such a theoretical model is necessary for a standard conceptual representation as well as for analyzing the workkows. This paper rst presents a Petri Net based model, called Color Timed Petri Net (CTPN), which is capable of modeling the attributes of both multilevel and discretionary security. With respect to the issue of mandatory security, this paper proposes a multilevel secure workkow transaction model and identiies the task dependencies in a workkow that cannot be enforced in order to meet multilevel security constraints. It shows how CTPN can be used to represent various types of task dependencies and shows how the task dependencies violating security can be automatically detected and prevented by building a Secure Petri Net (SPN) from CTPN. With respect to the issue of discretionary access control, this paper proposes a Work-ow Authorization Model (WAM) that is capable of specifying authorizations in such a way that subjects gain access to required objects only during the execution of the task, thus synchronizing the authorization ow with the workkow. To achieve this synchronization, an Authorization Template (AT) is associated with each task that allows appropriate authorizations to be granted only when the task starts and to be revoked when the task nishes. This paper also presents how this synchronization can be implemented using CTPN. We argue that Petri net is a suitable tool for modeling workkows because of its rich set of analysis techniques. Properties such as safety of workkows (i.e. whether a workkow terminates in an acceptable state) and safety of WAM can be tested using the already available analysis techniques of PNs.
منابع مشابه
The Formal Model of DBMS Enforcing Multiple Security Polices
The formal security policy model and security analysis is necessary to help Database Management System (DBMS) to attain a higher assurance level. In this paper we develop a formal security model for a DBMS enforcing multiple security policies including mandatory multilevel security policy, discretionary access control policy and role based access control policy. A novel composition scheme of po...
متن کاملDatabase Access Control Policies
As organizations increase their dependence on database systems for daily business, they become more vulnerable to security breaches even as they gain productivity and efficiency advantages. A truly comprehensive approach for data protection must include mechanisms for enforcing access control policies based on data contents, subject qualifications and characteristics. The database security comm...
متن کاملSecurity for next generation hypertext systems
This paper concerns the need for enhancing hypertext systems with security protection. We identify the elements of hypertext models which must be subject to security control. Main attention is directed toward hypertext and access control preventing the information stored from unauthorized disclosure or modification. From the class of known security models we consider the Discretionary Models, t...
متن کاملRole - Based Access Control ( Rbac ) Based In Hospital Management
A key issue in any information security is to protect information about all forms against unauthorized access. Innovation access control model is now becoming a need for application on systems due to emerging acts. Role based access control (RBAC) is a feasible alternative to traditional Discretionary Access Control (DAC) and Mandatory Access Control (MAC). RBAC has been presented to be cost op...
متن کاملRole-based Security
User role-based protection presents a exible (hence adaptive) means for enforcing diering ranges of security policies. It can emulate both mandatory and discretionary access control modes of protection. Role-based protection enforces the principle of least privilege, hence minimizing the risk of Trojan horse attacks. This paper oers a glimpse into the strengths (and some weaknesses) of role-bas...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Journal of Computer Security
دوره 5 شماره
صفحات -
تاریخ انتشار 1997