Consolidating the Access Control of Composite Applications and Workflows
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for composite applications should be provided. Such a policy is based on the policies of the corresponding autonomous sub-applications and has the following properties: On the one hand, it needs to be as restrictive as possible to block requests which do not comply with the integrated sub-applications’ policies. Thereby, unsuccessful executions of requests are prevented at an early stage. On the other hand, the composite policy must grant all necessary privileges in order to make the intended functionality available to legitimate users.
In this paper, we present our formal model and respective algorithmic solutions for consolidating the access control of composite applications. The generated policies conform to the presented requirements of the least privileges paradigm and, thus, allow to revise and optimize the access control of composite applications. We demonstrate this by means of Web service workflows that constitute the state of the art for the realization of business processes.
KeywordsAccess Control Business Process Access Control Policy Disjunctive Normal Form Role Base Access Control
- 4.ANSI INCITS 359-2004, Role Based Access Control. American National Standards Institute, Inc. (ANSI), New York, NY, USA (February 2004)Google Scholar
- 5.Nadalin, A., et al.: Web Services Secure Conversation Language (WS-SecureConversation) (February 2005), http://www-128.ibm.com/developerworks/library/specification/ws-secon/
- 12.Huang, W.-K., Atluri, V.: SecureFlow: a Secure Web-enabled Workflow Management System. In: RBAC 1999: Proceedings of the 4th ACM Workshop on Role-based Access Control, pp. 83–94. ACM Press, New York (1999)Google Scholar
- 13.Atluri, V., Huang, W.-K., Bertino, E.: A Semantic-Based Execution Model for Multilevel Secure Workflows. Journal of Computer Security 8(1) (2000)Google Scholar
- 15.Rits, M., Boe, B.D., Schaad, A.: Xact: a Bridge between Resource Management and Access Control in Multi-layered Applications. In: SESS 2005: Proceedings of the 2005 Workshop on Software Engineering for Secure Systems, pp. 1–7. ACM Press, New York (2005)Google Scholar
- 17.Advanced Technologies for interoperability of Heterogeneous Enterprise Networks and their Applications (ATHENA), European project. Project homepage: http://www.athena-ip.org