skip to main content
10.1145/1377836.1377842acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

Delegation and satisfiability in workflow systems

Published:11 June 2008Publication History

ABSTRACT

Supporting delegation mechanisms in workflow systems is receiving increasing interest from the research community. An important requirement of a constrained workflow is to guarantee the satisfiability of the workflow, which requires that some set of authorized users can complete a workflow. Typically, any mechanism that is used to establish the satisfiability of a workflow is based on the workflow specification and the user authorization information. The effect of a successful user delegation request is to change the user authorization information, thereby affecting the satisfiability of the workflow.

Existing work on delegation in workflows does not consider the satisfiability of the workflow. In this paper, we address the satisfiability problem of workflows, while supporting user delegation mechanisms, in the context of three different workflow execution models. We consider delegation of concrete tasks, abstract tasks and roles. We present algorithms for evaluating various delegation requests in each workflow execution model.

References

  1. Atluri, V., Bertino, E., Ferrari, E., and Mazzoleni, P. Supporting delegation in secure workflow management systems. In Proceedings of 17th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (2003), pp. 190--202.Google ScholarGoogle Scholar
  2. Atluri, V., and Wainer, J. Supporting conditional delegation in secure workflow management systems. In Proceedings of 10th ACM Symposium on Access Control Models and Technologies (2005), pp. 49--58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Crampton, J. A reference monitor for workflow systems with constrained task execution. In Proceedings of 10th ACM Symposium on Access Control Models and Technologies (2005), pp. 38--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Crampton, J. Personal communication to Ninghui Li, November 2006.Google ScholarGoogle Scholar
  5. Crampton, J., and Khambhammettu, H. Delegation in role-based access control. International Journal of Information Security 7, 2 (2008), 123--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Crampton, J., and Khambhammettu, H. On delegation and workflow execution models. In Proceedings of 23rd ACM Symposium on Applied Computing (2008), pp. 2137--2144. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Downey, R., and Fellows, M. Parameterized Complexity. Springer, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Kandala, S., and Sandhu, R. Secure role-based workflow models. Database Security XV: Status and Prospects (2002), 45--58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Venter, K., and Olivier, M. The delegation authorization model: A model for the dynamic delegation of authorization rights in a secure workflow management system. In Proceedings of Information Security South Africa (2002). Published electronically. Available at http://icsa.cs.up.ac.za/issa/2002/proceedings/A021.pdf.Google ScholarGoogle Scholar
  10. Wainer, J., Kumar, A., and Barthelmess, P. DW-RBAC: A formal security model of delegation and revocation in workflow systems. Information Systems 32, 3 (2007), 365--384. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Wang, Q., and Li, N. Satisfiability and resiliency in workflow systems. In Proceedings of 12th European Symposium On Research In Computer Security (2007), vol. 1146 of LNCS, pp. 90--115. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Delegation and satisfiability in workflow systems

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies
            June 2008
            214 pages
            ISBN:9781605581293
            DOI:10.1145/1377836

            Copyright © 2008 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 11 June 2008

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate177of597submissions,30%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader