An Authorization Model for Work Blockinows ?
نویسنده
چکیده
Work ows represent processes in manufacturing and o ce environments that typically consist of several well-de ned activities (known as tasks). To ensure that these tasks are executed by authorized users or processes (subjects), proper authorization mechanisms must be in place. Moreover, to make sure that authorized subjects gain access on the required objects only during the execution of the speci c task, granting and revoking of privileges need to be synchronized with the progression of the work ow. A prede ned speci cation of the privileges often allows access for more than the time required, thus, though a subject completes the task or have not yet begun the task, it may still possess privileges to access the objects, resulting in compromising security. In this paper, we propose a Work ow Authorization Model (WAM) that is capable of specifying authorizations in such a way that subjects gain access to required objects only during the execution of the task, thus synchronizing the authorization ow with the work ow. To achieve this synchronization, we associate an Authorization Template (AT) with each task, which allows appropriate authorizations to be granted only when the task starts and to revoke them when the task nishes. In this paper, we also present a model of implementation based on Petri nets and show how this synchronization can be implemented. Because the theoretical aspects of Petri nets have been extensively studied and due to their strong mathematical foundation, a Petri net representation of an authorization model serves as a good tool for conducting safety analysis since the safety problem in the authorization model is equivalent to the reachability problem in Petri nets.
منابع مشابه
An Effective Modality Conflict Model for Identifying Applicable Policies During Policy Evaluation
Policy evaluation is a process to determine whether a request submitted by a user satisfies the access control policies defined by an organization. Modality conflict is one of the main issues in policy evaluation. Existing modality conflict detection approaches do not consider complex condition attributes such as spatial and temporal constraints. An effective authorization propagation rule is n...
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملAccess control in ultra-large-scale systems using a data-centric middleware
The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...
متن کاملModeling a Bank ATM with Two Directions Places Timed Petri Net (TPN)
A Bank ATM is including controller, card authorization system and a teller unit .This paper explains howthis parts connects together. In this paper will be used of a new mode place in Petri nets. More systemsusually have a complex constructs. ATM will be simulated use of new mode place at this study. The Mainpart of this model is used of T.S.Staines model [1]. We discuss how a simple model of T...
متن کاملA Group-based Authorization Model for Computer-supported Cooperative Work
Requirements for access control in CSCW systems have often been stated but groupware in use today does not meet most of these requirements There are prac tical reasons for this but one of the problems is the inherent complexity of sophis ticated access control models We propose a general authorization model that emphasizes conceptual simplicity Several extensions to the basic model address well...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1996