Analyzing Security Requirements in Timed Workflow Processes

被引:12
|
作者
Du, Yanhua [1 ]
Wang, Yang [1 ]
Yang, Benyuan [2 ]
Hu, Hesuan [2 ]
机构
[1] Univ Sci & Technol Beijing, Sch Mech Engn, Beijing 100083, Peoples R China
[2] Xidian Univ, Sch Electromech Engn, Xian 710071, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Authorization; Safety; Automata; Analytical models; Process control; Business; Security requirement; workflow process; model checking; timed automata; ACCESS-CONTROL; SPECIFICATION LANGUAGE; COMPLIANCE CHECKING; INTEROPERATION; CONSTRAINTS; CONFLICTS; RESOURCE; DESIGN; NETS;
D O I
10.1109/TDSC.2020.2975163
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Much attention is being paid to security requirements of workflow processes with authorization policies, e.g., safety properties, liveness properties, separation of duties, binding of duties, and constraints of cardinality. However, existing methods neglect the execution condition of activities and the logical structures among activities along with their time attributes, suffer from low efficiency when checking the security requirements of large-scale and structurally complex workflow processes, and provide no solutions as a response to the violations of various security requirements. Thus, existing methods cannot guarantee the absolute security and smooth execution of such workflow processes. In this article, we propose a security team timed automaton (STTA) based approach to analyzing security requirements in timed workflow processes. First, we construct STTAs for timed workflow processes with authorization policies. Second, security requirements are automatically verified based on STTAs. Third, based on two effective strategies, we provide solutions to violated security requirements, if any. Compared with the existing methods, our approach can not only formally describe and analyze five commonly-viewed and frequently-adopted security requirements for timed workflow processes and dramatically decrease their temporal and spatial complexity for verification, but also provide solutions to the violations of security requirements so as to implement the security management of workflow processes.
引用
收藏
页码:190 / 207
页数:18
相关论文
共 50 条
  • [31] Timed processes of timed Petri nets
    Valero, V
    deFrutos, D
    Cuartero, F
    APPLICATION AND THEORY OF PETRI NETS 1995, 1995, 935 : 490 - 509
  • [32] Modeling and analyzing biomedical processes using workflow/Petri Net models and tools
    Peleg, M
    Tu, S
    Manindroo, A
    Altman, RB
    MEDINFO 2004: PROCEEDINGS OF THE 11TH WORLD CONGRESS ON MEDICAL INFORMATICS, PT 1 AND 2, 2004, 107 : 74 - 78
  • [33] A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities
    Golnaz Elahi
    Eric Yu
    Nicola Zannone
    Requirements Engineering, 2010, 15 : 41 - 62
  • [34] A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities
    Elahi, Golnaz
    Yu, Eric
    Zannone, Nicola
    REQUIREMENTS ENGINEERING, 2010, 15 (01) : 41 - 62
  • [35] Requirements for the workflow-based support of release management processes in the automotive sector
    Bestfleisch, U
    Herbst, J
    Reichert, M
    ECEC 2005: 12TH EUROPEAN CONCURRENT ENGINEERING CONFERENCE 2005, 2005, : 130 - 134
  • [36] Analyzing Transport Layer Protocols to Create an API to Satisfy Timed Response in Dynamic Requirements of Wireless Networks
    De Silva, Dhammika H.
    Ishak, M. M. Ahamed
    De Silva, G. C. M.
    Suranjith, A. V. S.
    Herath, H. M. H. S.
    14TH INTERNATIONAL CONFERENCE ON ADVANCES IN ICT FOR EMERGING REGIONS (ICTER) 2014, 2014, : 268 - 268
  • [37] Precision Evaluation of a class of Timed Workflow Nets
    Lefebvre, Dimitri
    Lopez-Mellado, Ernesto
    2020 7TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT'20), VOL 1, 2020, : 843 - 848
  • [38] A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept
    Langer, Lucie
    Schmidt, Axel
    Buchmann, Johannes
    Volkamer, Melanie
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 475 - 480
  • [39] Security-Aware Collaboration Plan Recommendation for Dynamic Multiple Workflow Processes
    Du, Yanhua
    Sun, Zijian
    Hu, Hesuan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (01) : 100 - 113
  • [40] Timed Signalling Processes
    Manohar, Rajit
    Moses, Yoram
    2023 28TH IEEE INTERNATIONAL SYMPOSIUM ON ASYNCHRONOUS CIRCUITS AND SYSTEMS, ASYNC, 2023, : 10 - 19