In recent years, workflow management systems (WFMSs) have gained popularity both in research as well as in commercial sectors. WFMSs are used to coordinate and streamline business processes of an organization. Often, very large WFMSs are used in organizations with users in the range of several thousands and number of process instances in the range of tens of thousands. To simplify the complexity of security administration, it is a common practice in many business organizations to allocate a role to perform each activity in the process and then assign one or more users to each role, and granting an authorization to roles rather than to users. Typically the security policies of the organization are expressed as constraints on users and roles. a well-known constraint is separation of duties. Unfortunately, current role-based access control models are not adequate to model such constraints. To address this issue, in this paper, (1) we present a language to express authorization constraints as clauses in a logic program, (2) provide formal notions of constraint consistency, and (3) propose algorithms to check for the consistency of the constraints and to assign roles and users to the workflow tasks in such a way that no constraints are violated.
[1]
Edward J. Coyne,et al.
Proceedings of the First ACM Workshop on Role-Based Access Control, RBAC 1995, Gaithersburg, MD, USA, November 30 - December 2, 1995
,
1996,
RBAC.
[2]
Subrata Kumar Das,et al.
Deductive Databases and Logic Programming
,
1992
.
[3]
Klaus R. Dittrich,et al.
Complex Subjects, or: The Striving for Complexity is Ruling our World
,
1993,
DBSec.
[4]
Elisa Bertino,et al.
A Uniied Framework for Enforcing Multiple Access Control Policies
,
1997
.
[5]
Elisa Bertino,et al.
A unified framework for enforcing multiple access control policies
,
1997,
SIGMOD '97.
[6]
Ravi S. Sandhu,et al.
Role-Based Access Control Models
,
1996,
Computer.
[7]
Vijayalakshmi Atluri,et al.
An Authorization Model for Workflows
,
1996,
ESORICS.
[8]
Ravi S. Sandhu,et al.
Separation of Duties in Computerized Information Systems
,
1990,
DBSec.
[9]
Ming-Chien Shan,et al.
Issues in Operation Flow Management for Long-Running Acivities
,
1993,
IEEE Data Eng. Bull..