skip to main content
10.1145/1063979.1063990acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article

Supporting conditional delegation in secure workflow management systems

Published:01 June 2005Publication History

ABSTRACT

Workflows model and control the execution of business processes in an organization. A workflow typically comprises of a set of coordinated activities, known as tasks. Typically, organizations establish a set of security policies, that regulate how the business process and resources should be managed. While a simple policy may specify which user (or role) can be assigned to execute a task, a complex policy may specify authorization constraints, such as separation of duties. Users may delegate the tasks assigned to them. Often such delegations are short-lived and come into play when certain conditions are satisfied. For example, a user may want to delegate his task of check approval only when going on vacation, when a check amount is less than a certain amount, or when his workload exceeds a certain limit.In this paper, we extend the notion of delegation to allow for such conditional delegation, where the delegation conditions can be based on time, workload and task attributes. When workflow systems entertain conditional delegation, different types of constraints come into play, which include authorization constraints, role activation constraints and workflow dependency requirements. We address the problem of assigning users to tasks in a consistent manner such that none of the constraints are violated.

References

  1. N.R. Adam, V. Atluri and W-K. Huang. Modeling and Analysis of Workflows Using Petri Nets. In Journal of Intelligent Information Systems, Special Issue on Workflow and Process Management, Volume 10, Number 2, March 1998, pages 131--158. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. V. Atluri, E. Bertino, E. Ferrari, P. Mazzoleni, Supporting Delegation in Secure Workflow Management Systems. In IFIP WG 11.3 Conference on Data and Application Security, August 2003.Google ScholarGoogle Scholar
  3. E. Barka and R. Sandhu. Framework for role-based delegation model. In Proceedings of 23rd National Information Systems Security Conference, pages 101-- 114, October 2000.Google ScholarGoogle ScholarCross RefCross Ref
  4. E. Bertino, E. Ferrari, and V. Atluri. An Approach for the Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Transactions on Information Systems Security, 2(1), February 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. E. Bertino, P. Bonatti and E. Ferrari, TRBAC: A Temporal Role-Based Access Control Model. In ACM Transactions on Information and System Security, Vol. 4, No. 3, August 2001, Pages 191-223 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S.K. Chang, G. Polese, R. Thomas, and S. Das. A Visual Language for Authorization Modeling. In Proc. of the IEEE Symposium on Visual Languages (VL97), 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. D. Clark and D. R. Wilson. A comparison of commercial and military computer security policies. In Proc. IEEE Symposium on Security and Privacy, pages 184--194, Oakland, California, April 1987.Google ScholarGoogle ScholarCross RefCross Ref
  8. J. Clifford and A. U. Tansel. On an algebra for historical relational databases: two views. In Proceedings of the ACM SIGMOD, pages 247--265, May 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Gasser and E. McDermott. An architecture for practical delegation of a distributed system. In Proc. IEEE Symposium on Security and Privacy, May 1990.Google ScholarGoogle ScholarCross RefCross Ref
  10. D. Georgakopoulos, M. Hornick, and A. Sheth. An Overview of Workflow Management: From Process Modeling to Workflow Automation Infrastructure. Distributed and Parallel Databases, pages 119--153, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Hollingsworth, Workflow reference model, Technical report WfMC-TC-1003, Workflow Management Coalition, January 1994.Google ScholarGoogle Scholar
  12. N. Li and B. N. Grosof. A practical implementation and tractable delegation logic. In Proc. IEEE Symposium on Security and Privacy, May 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J.W. Lloyd. Foundations of Logic Programming. Springer-Verlag, 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Rusinkiewicz and A. Sheth. Specification and Execution of Transactional Workflows. In W. Kim, editor, Modern Database Systems: The Object Model, Interoperability, and Beyond. Addison-Wesley, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. R. Sandhu. Separation of Duties in Computerized Information Systems. In Database Security IV: Status and Prospects, pages 179--189, 1991.Google ScholarGoogle Scholar
  16. Y. Shoham. Reasoning about change: Time and Causation from the standpoint of Artificial Intelligence. MIT press, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. L. Zhang, G. Ahn, and B. Chu. A rule-based framework for role based delegation. In Proceedings of the Sixth ACM Symposium on Access control models and technologies, pages 153--162, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. L. Zhang, G. Ahn, and B. Chu. A role-based delegation framework for healthcare information systems. In Seventh ACM Symposium on Access Control Models and Technologies, pages 125--134, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Supporting conditional delegation in secure workflow management systems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies
      June 2005
      186 pages
      ISBN:1595930450
      DOI:10.1145/1063979
      • General Chair:
      • Elena Ferrari,
      • Program Chair:
      • Gail-Joon Ahn

      Copyright © 2005 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 June 2005

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate177of597submissions,30%

      Upcoming Conference

      SACMAT 2024

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader