Abstract
Role-Based Access Control (RBAC) remains one of the most popular authorization control mechanisms. Workflow is a business flow composed of several related tasks. These tasks are interrelated and context-dependent during their execution. Under many circumstances execution context introduces uncertainty in authorization decisions for tasks. This paper investigates the role-based authorization model with the runtime context constraints and dynamic cardinality constraints. The Generalized Stochastic Petri-net is used to model the authorization process. Moreover, due to the state explosion problem in the Petri-net formalism, the proposed modeling method combines the Queuing theory to analyze both system-oriented and user-oriented performance. Given the workflow information, its running context and the authorization policies, this work can be used to predict the performance of these workflows running in the system. The prediction information can give insight in how to adjust authorization policies to strike a better balance between security and performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Sandhu, R.S., Coyne, E.J., Feistein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer 29(2), 38–47 (1996)
Ahn, G., Sandhu, R.: Role-Based Authorization Constraints Specification. ACM Trans. Information and System Security 3(4), 207–226 (2000)
Ahn, G., Sandhu, R.: The RSL99 Language for Role-based Separation of Duty Constraints. In: Proceedings of the Fourth ACM Workshop on Role-based Access Control, Fairfax, Virginia, United States, October 28-29, pp. 43–54 (1999)
Botha, R., Eloff, J.: Separation of Duties for Access Control Enforcement in Workflow Environments. IBM Systems Journal 40(3), 666–682 (2001)
Joshi, J., Bertino, E., Latif, U., Ghafoor, A.: A Generalized Temporal Role-Based Access Control Model. IEEE Transactions on Knowledge and Data Engineering 17(1), 4–23 (2005)
Wainer, J., Barthelmess, P., Kumar, A.: W-RBAC- A Workflow Security Model Incorporating Controlled Overriding of Constraints. International Journal of Cooperative Information Systems 12(4), 455–486 (2003)
Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: a Temporal Role-based Access Control Model. In: Proceedings of the Fifth ACM Workshop on Role-based Access Control, Berlin, Germany, July 26-28, pp. 21–30 (2000)
Wang, Q., Li, N.: Satisfiability and Resiliency in Workflow Authorization Systems. ACM Transactions on Information and System Security (TISSEC) 13(4), 1–35 (2010)
Thomas, R.K., Sandhu, R.S.: Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management. In: IFIP TC11 WG113 11th International Conference on Database Security XI Status and Prospects, vol. 11, pp. 166–181. Chapman & Hall, Ltd
Bertino, E., Ferrari, E.: An authorization Model for Supporting the Specification and Enforcement of Role-based Authorization in Workflow Management Systems. ACM Transactions on Information and System Security 2(1), 65–104 (1999)
Castano, S., Casati, F., Fugini, M.: Managing Workflow Authorization Constraints through Active Database Technology. Information Systems Frontiers 3(3), 319–338 (2001)
van der Aalst, W.M.P.: The Application of Petri Nets to Workflow Management. The Journal of Circuits, Systems and Computers 8(1), 21–66 (1998)
Ray, I., Li, N., France, R., Kim, D.K.: Using UML to Visualize Role-based Access Control Constraints. In: Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, Yorktown Heights, New York, USA, June 02-04, pp. 115–124 (2004)
Tan, K., Crampton, J., Gunter, C.: The Consistency of Task-based Authorization Constraints in Workflow Systems. In: Proceedings of 17th IEEE Computer Security Foundations Workshop, pp. 155–169 (2004)
Liu, S., Fan, Y.S.: Workflow Model Performance Analysis Concerning Instance Dwelling Times Distribution. In: 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA, pp. 601–605 (2009)
Li, J.Q., Fan, Y.S., Zhou, M.C.: Performance Modeling and Analysis of Workflow. IEEE Transactions on System, Man, and Cybernetics A 34, 229–242 (2004)
He, L., Calleja, M., Hayes, M., Jarvis, S.A.: Performance Prediction for Running Workflows under Role-based Authorization Mechanisms. In: IEEE International Symposium on Parallel and Distributed Processing, pp. 1–8 (2009)
Manolache, S.: Schedulability Analysis of Real-Time Systems with Stochastic Task Execution Times. Ph.D Thesis, Department of Computer and Information Science, IDA, Linkoping University
Gallager, R.G.: Discrete Stochastic Process. Kluwer Academic Publishers Group (1996)
Adan, I., Resing, J.: Queueing Theory. Eindhoven University of Technology (2002)
Bunday, B.D.: An introduction to queueing theory. Arnold, London (1996)
Gross, D., Harris, C.M.: Fundamentals of Queueing Theory. Wiley, Chichester (1985)
Robertazzi, T.G.: Computer Networks and Systems – Queueing Theory and Performance Evaluation. Springer, New York (1994)
Bolch, G., Greiner, S., de Meer, H., Trivedi, K.S.: Queueing Networks and Markov Chains – Modeling and Performance Evaluation with Computer Science Applications. John Wiley and Sons, New York (1998)
Li, N., Tripunitara, M.V., Bizri, Z.: On Mutually Exclusive Roles and Separation-of-duty. ACM Transactions on Information and System Security (TISSEC) 10(2), 5-es (2007)
van Hoorn, M.H., Tijms, H.C.: Approximations for the Waiting Time Distribution of the M/G/C queue. Performance Evaluation 2(1), 22–28 (1982)
Boxma, O.J., Cohen, J.W., Huffels, N.: Approximations of the Mean Waiting Time in an M/G/C Queuing System. Operations Research 27, 1115–1127 (1980)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, L., He, L., Jarvis, S.A. (2012). Performance Analysis for Workflow Management Systems under Role-Based Authorization Control. In: Li, R., Cao, J., Bourgeois, J. (eds) Advances in Grid and Pervasive Computing. GPC 2012. Lecture Notes in Computer Science, vol 7296. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30767-6_28
Download citation
DOI: https://doi.org/10.1007/978-3-642-30767-6_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30766-9
Online ISBN: 978-3-642-30767-6
eBook Packages: Computer ScienceComputer Science (R0)