Analyzing Security Requirements in Timed Workflow Processes

被引:12
|
作者
Du, Yanhua [1 ]
Wang, Yang [1 ]
Yang, Benyuan [2 ]
Hu, Hesuan [2 ]
机构
[1] Univ Sci & Technol Beijing, Sch Mech Engn, Beijing 100083, Peoples R China
[2] Xidian Univ, Sch Electromech Engn, Xian 710071, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Authorization; Safety; Automata; Analytical models; Process control; Business; Security requirement; workflow process; model checking; timed automata; ACCESS-CONTROL; SPECIFICATION LANGUAGE; COMPLIANCE CHECKING; INTEROPERATION; CONSTRAINTS; CONFLICTS; RESOURCE; DESIGN; NETS;
D O I
10.1109/TDSC.2020.2975163
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Much attention is being paid to security requirements of workflow processes with authorization policies, e.g., safety properties, liveness properties, separation of duties, binding of duties, and constraints of cardinality. However, existing methods neglect the execution condition of activities and the logical structures among activities along with their time attributes, suffer from low efficiency when checking the security requirements of large-scale and structurally complex workflow processes, and provide no solutions as a response to the violations of various security requirements. Thus, existing methods cannot guarantee the absolute security and smooth execution of such workflow processes. In this article, we propose a security team timed automaton (STTA) based approach to analyzing security requirements in timed workflow processes. First, we construct STTAs for timed workflow processes with authorization policies. Second, security requirements are automatically verified based on STTAs. Third, based on two effective strategies, we provide solutions to violated security requirements, if any. Compared with the existing methods, our approach can not only formally describe and analyze five commonly-viewed and frequently-adopted security requirements for timed workflow processes and dramatically decrease their temporal and spatial complexity for verification, but also provide solutions to the violations of security requirements so as to implement the security management of workflow processes.
引用
收藏
页码:190 / 207
页数:18
相关论文
共 50 条
  • [1] Analyzing Degree of Parallelism for Concurrent Timed Workflow Processes With Shared Resources
    Du, Yanhua
    Wang, Li
    Li, Xitong
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2017, 64 (01) : 42 - 56
  • [2] Towards modelling and analyzing timed workflow systems with complex synchronizations
    Hamdani, Abdia
    Abdelli, Abdelkrim
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2020, 32 (04) : 491 - 504
  • [3] Dynamic Monitoring of Service Outsourcing for Timed Workflow Processes
    Du, Yanhua
    Wang, Li
    Mu, Gege
    Li, Xitong
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2019, 66 (04) : 715 - 729
  • [4] Analyzing and Evaluating Security Features in Software Requirements
    Malhotra, Ruchika
    Chug, Anuradha
    Hayrapetian, Allenoush
    Raje, Rajeev
    2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 26 - 30
  • [5] Analyzing and Enforcing Security Mechanisms on Requirements Specifications
    Li, Tong
    Horkoff, Jennifer
    Mylopoulos, John
    REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY ( REFSQ 2015), 2015, 9013 : 115 - 131
  • [6] Analyzing regulatory rules for privacy and security requirements
    Breaux, Travis D.
    Anton, Annie I.
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2008, 34 (01) : 5 - 20
  • [7] A novel reduction approach to analyzing QoS of workflow processes
    Xia, Yunni
    Zhu, Qingsheng
    Huang, Yu
    Wang, Zizhen
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2009, 21 (02): : 205 - 223
  • [8] Timed workflow nets
    Tiplea, FL
    Macovei, GI
    SEVENTH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING, PROCEEDINGS, 2005, : 361 - 366
  • [9] Analyzing requirements engineering processes: A case study
    Houdek, F
    Pohl, K
    11TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATION, PROCEEDINGS, 2000, : 983 - 987
  • [10] EMPIRICALLY ANALYZING AND EVALUATING SECURITY FEATURES IN SOFTWARE REQUIREMENTS
    Hayrapetian, Allenoush
    Raje, Rajeev
    ISEC'18: PROCEEDINGS OF THE 11TH INNOVATIONS IN SOFTWARE ENGINEERING CONFERENCE, 2018,