On the satisfiability of authorization requirements in business process

被引:5
|
作者
Bo, Yang [1 ,2 ]
Xia, Chunhe [1 ,2 ,3 ]
Zhang, Zhigang [1 ,2 ]
Lu, Xinzheng [4 ]
机构
[1] Beihang Univ, Beijing Key Lab Network Technol, Beijing 100191, Peoples R China
[2] Beihang Univ, Sch Comp Sci & Engn, Beijing 100191, Peoples R China
[3] Beihang Univ Shenzhen, Res Inst, Shenzhen 518057, Peoples R China
[4] Minist Educ, Natl Educ Examinat Author, Beijing 100084, Peoples R China
关键词
satisfiability; authorization requirements; separation of duty; binding of duty; business process; CONSTRAINTS;
D O I
10.1007/s11704-016-6016-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Satisfiability problem of authorization requirements in business process asks whether there exists an assignment of users to tasks that satisfies all the requirements, and methods were proposed to solve this problem. However, the proposed methods are inefficient in the sense that a step of the methods is searching all the possible assignments, which is time-consuming. This work proposes a method to solve the satisfiability problem of authorization requirements without browsing the assignments space. Our method uses improved separation of duty algebra (ISoDA) to describe a satisfiability problem of qualification requirements and quantification requirements (Separation of Duty and Binding of Duty requirements). Thereafter, ISoDA expressions are reduced into multi-mutual-exclusive expressions. The satisfiabilities of multi-mutual-exclusive expressions are determined by an efficient algorithm proposed in this study. The experiment shows that our method is faster than the state-of-the-art methods.
引用
收藏
页码:528 / 540
页数:13
相关论文
共 50 条
  • [1] On the satisfiability of authorization requirements in business process
    Yang Bo
    Chunhe Xia
    Zhigang Zhang
    Xinzheng Lu
    [J]. Frontiers of Computer Science, 2017, 11 : 528 - 540
  • [2] Model checking authorization requirements in business processes
    Armando, Alessandro
    Ponta, Serena Elisa
    [J]. COMPUTERS & SECURITY, 2014, 40 : 1 - 22
  • [3] From business process choreography to authorization policies
    Robinson, Philip
    Kerschbaum, Florian
    Schaad, Andreas
    [J]. DATA AND APPLICATIONS SECURITY XX, PROCEEDINGS, 2006, 4127 : 297 - 309
  • [4] Satisfiability and Resiliency in Workflow Authorization Systems
    Wang, Qihua
    Li, Ninghui
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (04)
  • [5] Business implications on the requirements process
    Miller, B
    [J]. FIFTH IEEE INTERNATIONAL SYMPOSIUM ON REQUIREMENTS ENGINEERING, PROCEEDINGS, 2001, : 274 - 274
  • [6] Business process oriented requirements engineering process
    Arao, T
    Goto, E
    Nagata, T
    [J]. 13th IEEE International Conference on Requirements Engineering, Proceedings, 2005, : 395 - 399
  • [7] Checking Satisfiability Aspects of Binding Constraints in a Business Process Context
    Schefer, Sigrid
    Strembeck, Mark
    Mendling, Jan
    [J]. BUSINESS PROCESS MANAGEMENT WORKSHOPS, PT II, 2012, 100 : 465 - +
  • [8] Requirements for Business Process Management Systems Supporting Business Process Agility
    Heininger, Richard
    [J]. S-BPM ONE - EDUCATION AND INDUSTRIAL DEVELOPMENTS, 2012, 284 : 168 - 180
  • [9] Specifying Business Process Outsourcing Requirements
    Rekik, Mouna
    Boukadi, Khouloud
    Ben-Abdallah, Hanene
    [J]. SOFTWARE TECHNOLOGIES (ICSOFT 2015), 2016, 586 : 175 - 190
  • [10] Role of Business Process Models in Requirements Engineering
    Ashraf, Fatima
    Abdullah, Mohd Syazwan
    [J]. COMPUTING & INFORMATICS, 2009, : 21 - 26