期刊文献+

业务流程授权约束依从性分析

Compliance Analysis of Authorization Constraints in Business Process
下载PDF
导出
摘要 授权约束的依从性研究是业务流程安全领域中的重要研究内容.针对授权约束提出了全新的业务流程依从性分析框架,该框架可以处理:1)流程授权和非流程授权;2)业务流程任务委托;3)角色继承关系;4)职责分离和职责绑定约束;5)静态约束和动态约束.提出授权图表示依从性分析框架,并给出授权图的构造和化简方法对授权图进行维护,然后设计了针对授权图的依从性分析算法.基于分析结果,给出了不依从授权约束的冲突模式,针对每一种冲突模式设计一组解决方案,并实现了原型系统.所提出的授权约束依从性分析框架独立于系统部署的平台,适用范围广泛.最后通过实例分析和实验验证说明了该方法的有效性. A novel framework of business process compliance analysis is proposed in this paper,and the proposed framework can process 1)business process authorization and non-business process authorization;2)delegation of task of business processes;3)inheritance of roles;4)separation of duty and binding of duty constraints;5)statics constraints and dynamic constraints.Authorization graph is proposed to describe the framework,and construct and reduce methods of authorization graph are designed to maintain the graph,then compliance analysis algorithms of authorization graph are proposed.Based on the analysis results,conflict patterns are presented.A set of resolutions for each pattern are provided,and a prototype system is implemented.The framework of authorization constraint compliance analysis,independent of platform,can be widely applied to system security analyzing.The effectiveness of the proposed method is reported by a case study and experiments at the end of this paper.
作者 薄阳 夏春和
出处 《计算机研究与发展》 EI CSCD 北大核心 2017年第10期2404-2418,共15页 Journal of Computer Research and Development
基金 国家自然科学基金联合基金项目(U1636208) 中航工业产学研项目(CXY2011BH07)~~
关键词 业务流程 授权约束 依从性 职责分离 职责绑定 任务委托 business process authorization constraints compliance separation of duty binding of duty task delegation
  • 相关文献

参考文献2

二级参考文献15

  • 1R.S. Sandhu. Separation of duties in computerized information systems. In: S. Jajodia, C. E. Lanwehreds. Database SecurityⅣ. North Holland: Elsevier Science Publisher, 1991. 179~189.
  • 2R.S. Sandhu, E. J. Coyne, H. L. Feinstein, et al. Role-based access control models. IEEE Computer, 1996, 29(2): 38~47.
  • 3G.J. Ahn, R. S. Sandhu. Role-based authorization constraints specification. ACM Trans. Information and System Security,2000, 3(4): 207~226.
  • 4V. Atluri, W. K. Huang. An authorization model for workflows.In: Proc. 5th European Symposium on Research in Computer Security, Lecture Notes in Computer Science. New York:Springer-Verlag, 1996. 44~64.
  • 5V. Atluri, W. K. Huang. A Petri net based safety analysis of workflow authorization models. Journal of Computer Security,2000, 8(2): 83~94.
  • 6E. Bertino, P. A. Bonatti, E. Ferrari. TRBAC: A temporal role-based access control model. ACM Trans. Information and System Security, 2001, 4(3): 191~223.
  • 7N.R. Adam, V. Atluri, W. K. Huang. Modeling and analysis of workflows using Petri nets. Journal of Intelligent Information Systems, 1998, 10(2): 131~158.
  • 8范玉顺.工作流管理技术基础[M].北京:清华大学出版社,2001.
  • 9E Bertino, E Ferrari, V AtlurL The speeifieation and enforeement of authorization constraints in workflow management systems [J]. ACM Trans on Information and System Security, 1999, 2(1): 65-104.
  • 10Workflow Management Coalition Terminology and Glossary [OL]. http://www, aiim. org/wfmc/, 1999-02-29.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部