Advertisement

Authorization Policy Based Business Collaboration Reliability Verification

  • Haiyang Sun
  • Xin Wang
  • Jian Yang
  • Yanchun Zhang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5364)

Abstract

Collaborative business can become unreliable in terms of authorization policy conflicts, for example, when (1) incorrect role assignment or modification occurs in a service within one organization or (2) messages transferred from one organization are accessed by unqualified roles in other collaborating business partners. Therefore reliability verification based on access policies is critical for business collaboration. In this paper, a role authorization model, Role-Net, is developed based on Hierarchical Colored Petri Nets (HCPNs) to specify and manage role authorization in business collaboration and to verify collaboration reliability according to partners’ authorization policies.

Keywords

Lower Layer Role Element Business Process Execution Language Role Assignment Authorization Policy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Papazoglou, M.P., Georgakopoulos, D.: Service-oriented computing: Introduction. Communications of the ACM 46-10, 24–28 (2003)CrossRefGoogle Scholar
  2. 2.
    Wang, X., Zhang, Y., Shi, H., Yang, J.: BPEL4RBAC: An Authorisation Specification for WS-BPEL. In: Bailey, J., Maier, D., Schewe, K.-D., Thalheim, B., Wang, X.S. (eds.) WISE 2008. LNCS, vol. 5175, pp. 381–395. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  3. 3.
    Ferraiolo, D., Cugini, J., Kuhn, R.: Role Based Access Control:Features and Motivations. In: Proceedings of Annual Computer Security Applications Conference. IEEE Computer Society Press, Los Alamitos (1995)Google Scholar
  4. 4.
    Wang, H., Cao, J., Zhang, Y.: A flexible payment scheme and its role-based access control. IEEE Transactions on Knowledge and Data Engineering 17(3), 425–436 (2005)CrossRefGoogle Scholar
  5. 5.
    Bertino, E., Crampton, J., Paci, F.: Access Control and Authorization Constraints for WS-BPEL. In: Proceedings of ICWS (2006)Google Scholar
  6. 6.
    OASIS Web Services Business Process Execution Language (WS-BPEL) Technical Committee. Web services business process execution language version 2.0, ws-bpel (2007), http://docs.oasis-open.org/wsbpel/2.0/cs01/wsbpel-v2.0-cs01.html
  7. 7.
    Liu, P., Chen, Z.: An Access Control Model for Web Services in Business Process. In: Proceedings of WI (2004)Google Scholar
  8. 8.
    Knorr, K.: Dynamic Access Control through Petri Net Workflows. In: Proceedings of ACSAC (2000)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Haiyang Sun
    • 1
  • Xin Wang
    • 2
  • Jian Yang
    • 1
  • Yanchun Zhang
    • 2
  1. 1.Department of ComputingMacquarie UniversitySydneyAustralia
  2. 2.School of Computer Science and MathematicsVictoria University, MelbourneVictoriaAustralia

Personalised recommendations