skip to main content
article
Free Access

The specification and enforcement of authorization constraints in workflow management systems

Published:01 February 1999Publication History
Skip Abstract Section

Abstract

In recent years, workflow management systems (WFMSs) have gained popularity in both research and commercial sectors. WFMSs are used to coordinate and streamline business processes. Very large WFMSs are often used in organizations with users in the range of several thousands and process instances in the range of tens and thousands. To simplify the complexity of security administration, it is common practice in many businesses to allocate a role for each activity in the process and then assign one or more users to each role—granting an authorization to roles rather than to users. Typically, security policies are expressed as constraints (or rules) on users and roles; separation of duties is a well-known constraint. Unfortunately, current role-based access control models are not adequate to model such constraints. To address this issue we (1) present a language to express both static and dynamic authorization constraints as clauses in a logic program; (2) provide formal notions of constraint consistency; and (3) propose algorithms to check the consistency of constraints and assign users and roles to tasks that constitute the workflow in such a way that no constraints are violated.

References

  1. ADAM, N., ATLURI, V., AND HUANG, W. K. 1998. Modeling and analysis of workflows using petri nets. J. Intell. Inf. Syst. 10, 2, 131-158. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. BONATTI, P., SAPINO, M., AND SUBRAHMANIAN, V. S. 1996. Merging heterogeneous security orderings. In Proceedings of the Conference on Computer Security (ESORICS 96, Rome, Italy), E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds. Springer-Verlag, New York, NY, 183-197. Google ScholarGoogle Scholar
  3. CADOLI, M. AND SCHAERF, M. 1993. Complexity results for non-monotonic logics. J. Logic Program. 17.Google ScholarGoogle Scholar
  4. CHANG, S., POLESE, G., THOMAS, R., AND DAS, S. 1997. A visual language for authorization modeling. In Proceedings of the IEEE Symposium on Visual Languages (VL97, Capri, Italy). IEEE Computer Society Press, Los Alamitos, CA. Google ScholarGoogle Scholar
  5. CLARK, D. AND WILSON, D. 1987. A comparison of commercial and military computer security policies. In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA). IEEE Computer Society Press, Los Alamitos, CA, 184-194.Google ScholarGoogle Scholar
  6. DAS, S. 1992. Deductive Databases and Logic Programming. Addison-Wesley, Reading, MA.Google ScholarGoogle Scholar
  7. GELFOND, M. AND LIFSCHITZ, V. 1988. The stable model semantics for logic programming. In Proceedings of the 5th International Conference on Logic Programming (Cambridge, MA). MIT Press, Cambridge, MA, 1070-1080.Google ScholarGoogle Scholar
  8. GEORGAKOPOULOS, D., HORNICK, M., AND SHETH, A. 1995. An overview of workflow management: from process modeling to workflow automation infrastructure. Distrib. Parallel Databases 3, 2 (Apr. 1995), 119-153. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. JONSCHER, D., MOFFET, J., AND DITTRICH, K. 1994. Complex subjects or the striving for complexity is ruling our world. In Database Security VII: Status and Prospects. Elsevier North-Holland, Inc., Amsterdam, The Netherlands, 19-37. Google ScholarGoogle Scholar
  10. LLOYD, J. W. 1984. Foundations of Logic Programming. Springer-Verlag, New York, NY. Google ScholarGoogle Scholar
  11. LOTUS CORPORATION, 1996. Lotus Notes Administrator's Reference Manual, Release 4. Lotus Publ. Corp., Cambridge, MA.Google ScholarGoogle Scholar
  12. MEDINA-MORA, R., TONG, H., AND FLORES, P. 1993. ActionWorkflow as the enterprise integration technology. IEEE Data Eng. Tech. Bull. 16, 2, 49-52.Google ScholarGoogle Scholar
  13. NYANCHAMA, M. AND OSBORN, S. 1993. Role-based security, object oriented databases and separation of duty. SIGMOD Rec. 22, 4 (Dec. 1993), 45-51. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. NYANCHAMA, M. AND OSBORN, S. 1996. Modeling mandatory access control in role-based security systems. In Database Security IX: Status and Prospects. Elsevier North-Holland, Inc., New York, NY, 129-144. Google ScholarGoogle Scholar
  15. Proceedings of the 1st (1996) ACM Workshop on Role-Based Access Control. ACM Press, New York, NY.Google ScholarGoogle Scholar
  16. RAMAKRISHNAN, R., SRIVASTAVA, D., AND SUDARSHAN, S. 1994. The coral deductive system. VLDB J. 3, 2, 161-210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. SANDHU, R. 1991. Separation of duties in computerized information systems. In Database Security IV: Status and Prospects. Elsevier North-Holland, Inc., New York, NY, 179-189.Google ScholarGoogle Scholar
  18. SANDHU, R. 1996. Role hierarchies and constraints for lattice-based access controls. In Proceedings of the Conference on Computer Security (ESORICS 96, Rome, Italy), E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds. Springer-Verlag, New York, NY, 65-79. Google ScholarGoogle Scholar
  19. SANDHU, R., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role-based access control models. IEEE Comput. 29, 2 (Feb.), 38-47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. THOMAS, R. AND SANDHU, R. 1997. Task-based authorization controls (TBAC): Models for active and enterprise-oriented authorization management. In Proceedings of the 11th IFIP Working Conference on Database Security (Lake Tahoe, CA). Chapman & Hall, Ltd., London, UK, 136-151. Google ScholarGoogle Scholar
  21. ULLMAN, J. 1989. Principles of Database and Knowledge-Base Systems. Computer Science Press, Inc., New York, NY. Google ScholarGoogle Scholar
  22. VAN GELDER, A., ROSS, K. A., AND SCHLIPF, J. S. 1991. The well-founded semantics for general logic programs. J. ACM 38, 3 (July 1991), 619-649. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The specification and enforcement of authorization constraints in workflow management systems

      Recommendations

      Reviews

      Jaak Tepandi

      Workflow management systems (WFMSs) are used to implement and control business processes. This comprehensive research paper addresses security policies within WFMSs. To manage security administration, a role is often assigned to each activity in the process. One or more users are assigned to each role; the system grants authorization to roles rather than to users. Security policies are then expressed as constraints on users and roles. A well-known example of a constraint on security policies is separation of duties. The authors present a language for expressing both static and dynamic authorization constraints as clauses in a logic program. Formal notions of constraint consistency are provided. The authors propose algorithms to check the consistency of constraints and to assign users to tasks that constitute the workflow in such a way that constraints are not violated. The use of logic programs as a formal notation for representing the authorization constraints allows the formalization of the complex problem of representing authorization constraints and presenting formal proofs of their consistency. However, it may make the paper more difficult to read, especially for readers with no background in formal logic. The assumption made in the paper that all the tasks in a workflow are executed sequentially, according to a specified total order, is often invalid in real-life WFMSs. This paper may be useful to researchers and developers in this area.

      Access critical reviews of Computing literature here

      Become a reviewer for Computing Reviews.

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Information and System Security
        ACM Transactions on Information and System Security  Volume 2, Issue 1
        Special issue on role-based access control
        Feb. 1999
        135 pages
        ISSN:1094-9224
        EISSN:1557-7406
        DOI:10.1145/300830
        Issue’s Table of Contents

        Copyright © 1999 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 February 1999
        Published in tissec Volume 2, Issue 1

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader