Analyzing Security Requirements in Timed Workflow Processes

被引:12
|
作者
Du, Yanhua [1 ]
Wang, Yang [1 ]
Yang, Benyuan [2 ]
Hu, Hesuan [2 ]
机构
[1] Univ Sci & Technol Beijing, Sch Mech Engn, Beijing 100083, Peoples R China
[2] Xidian Univ, Sch Electromech Engn, Xian 710071, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Authorization; Safety; Automata; Analytical models; Process control; Business; Security requirement; workflow process; model checking; timed automata; ACCESS-CONTROL; SPECIFICATION LANGUAGE; COMPLIANCE CHECKING; INTEROPERATION; CONSTRAINTS; CONFLICTS; RESOURCE; DESIGN; NETS;
D O I
10.1109/TDSC.2020.2975163
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Much attention is being paid to security requirements of workflow processes with authorization policies, e.g., safety properties, liveness properties, separation of duties, binding of duties, and constraints of cardinality. However, existing methods neglect the execution condition of activities and the logical structures among activities along with their time attributes, suffer from low efficiency when checking the security requirements of large-scale and structurally complex workflow processes, and provide no solutions as a response to the violations of various security requirements. Thus, existing methods cannot guarantee the absolute security and smooth execution of such workflow processes. In this article, we propose a security team timed automaton (STTA) based approach to analyzing security requirements in timed workflow processes. First, we construct STTAs for timed workflow processes with authorization policies. Second, security requirements are automatically verified based on STTAs. Third, based on two effective strategies, we provide solutions to violated security requirements, if any. Compared with the existing methods, our approach can not only formally describe and analyze five commonly-viewed and frequently-adopted security requirements for timed workflow processes and dramatically decrease their temporal and spatial complexity for verification, but also provide solutions to the violations of security requirements so as to implement the security management of workflow processes.
引用
收藏
页码:190 / 207
页数:18
相关论文
共 50 条
  • [41] Timed Analysis of Security Protocols
    Szymoniak, Sabina
    Siedlecka-Lamch, Olga
    Kurkowski, Miroslaw
    INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY - ISAT 2016 - PT II, 2017, 522 : 53 - 63
  • [42] Timed Automata Semantics for Analyzing Creol
    Jaghoori, Mohammad Mahdi
    Chothia, Tom
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2010, (30): : 108 - 122
  • [43] Timed analysis of security protocols
    Corin, R.
    Etalle, S.
    Hartel, P.
    Mader, A.
    JOURNAL OF COMPUTER SECURITY, 2007, 15 (06) : 619 - 645
  • [44] Timed Automata Based Model Checking of Timed Security Protocols
    Kurkowski, Miroslaw
    Penczek, Wojciech
    FUNDAMENTA INFORMATICAE, 2009, 93 (1-3) : 245 - 259
  • [45] Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns
    Matulevicius, Raimundas
    Ahmed, Naved
    IT-INFORMATION TECHNOLOGY, 2013, 55 (06): : 225 - 230
  • [46] Practical experiences and requirements on workflow
    Kim, KH
    Paik, SK
    COORDINATION TECHNOLOGY FOR COLLABORATIVE APPLICATIONS: ORGANIZATIONS, PROCESSES, AND AGENTS, 1998, 1364 : 145 - 160
  • [47] Timed Automaton RVT-Grammar for Workflow Translating
    Afanasyev, Alexander
    Voit, Nikolay
    Kirillov, Sergey
    ADVANCES IN COMPUTATIONAL INTELLIGENCE, MICAI 2018, PT II, 2018, 11289 : 146 - 155
  • [48] Towards a UML 2.0 extension for the modeling of security requirements in business processes
    Rodriguez, Alfonso
    Fernandez-Medina, Eduardo
    Piattini, Mario
    TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 51 - 61
  • [49] Dynamic Assignment of Roles and Users for Business Processes Under Security Requirements
    Du, Yanhua
    Zhou, Yongchuan
    Hu, Hesuan
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (10) : 10344 - 10355
  • [50] Presentation and Validation of Method for Security Requirements Elicitation from Business Processes
    Ahmed, Naved
    Matulevicius, Raimundas
    INFORMATION SYSTEMS ENGINEERING IN COMPLEX ENVIRONMENTS, 2015, 204 : 20 - 35