From business process choreography to authorization policies

被引:0
|
作者
Robinson, Philip [1 ]
Kerschbaum, Florian
Schaad, Andreas
机构
[1] SAP Res, Karlsruhe, Germany
[2] SAP Res, Sophia Antipolis, France
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A choreography specifies the interactions between the resources of multiple collaborating parties at design time. The runtime management of authorization policies in order to support such a specification is however tedious for administrators to manually handle. By compiling the choreography into enhanced authorization policies, we are able to automatically derive the minimal authorizations required for collaboration, as well as enable and disable the authorizations in a just-in-time manner that matches the control flow described in the choreography. We have evaluated the advantage of this utility in a collaborative engineering scenario.
引用
收藏
页码:297 / 309
页数:13
相关论文
共 50 条
  • [41] From Authorization Logics to Types for Authorization
    Jagadeesan, Radha
    [J]. PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2008, 5356 : 255 - 255
  • [42] Business Collaboration Models and their Business Context-dependent Web Choreography in BPSS
    Hofreiter, Birgit
    Huemer, Christian
    Winiwarter, Werner
    [J]. INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS, 2005, 1 (01) : 33 - +
  • [43] An XACML Extension for Business Process-centric Access Control Policies
    Wolter, Christian
    Weiss, Christian
    Meinel, Christoph
    [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, 2009, : 166 - +
  • [44] Tracking entities: Choreography as a cartographic process
    Sweeney, Rachel
    [J]. CHOREOGRAPHIC PRACTICES, 2012, 2 (01) : 69 - 85
  • [45] Identify Authorization Control Requirement in Business Collaboration
    He, Daisy Daiqin
    Yang, Jian
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, VOL 2, 2008, : 561 - 562
  • [46] Model checking authorization requirements in business processes
    Armando, Alessandro
    Ponta, Serena Elisa
    [J]. COMPUTERS & SECURITY, 2014, 40 : 1 - 22
  • [47] Choreography frameworks for business integration: Addressing heterogeneous semantics
    Arroyo, Sinuhe
    Sicilia, Miguel-Angel
    Dodero, Juan-Manuel
    [J]. COMPUTERS IN INDUSTRY, 2007, 58 (06) : 487 - 503
  • [48] Pattern templates for automating business choreography on Web services
    Paik, Incheon
    Suzuki, Hiroto
    [J]. 21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS WORKSHOPS/SYMPOSIA, VOL 2, PROCEEDINGS, 2007, : 512 - +
  • [49] Formal Approach for Authorization in Distributed Business Process Related Task Document Role Based Access Control
    Maroua, Nouioua
    Belhassen, Zouari
    Adel, Alti
    [J]. 2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1964 - 1970
  • [50] Compiling NATO Authorization Policies for Enforcement in the Cloud and SDNs
    Armando, Alessandro
    Ranise, Silvio
    Traverso, Riccardo
    Wrona, Konrad
    [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 741 - 742