Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

IFIP Annual Conference on Data and Applications Security and Privacy

DBSec 2006: Data and Applications Security XX pp 44–59Cite as

  1. Home
  2. Data and Applications Security XX
  3. Conference paper
Consolidating the Access Control of Composite Applications and Workflows

Consolidating the Access Control of Composite Applications and Workflows

  • Martin Wimmer18,
  • Alfons Kemper18,
  • Maarten Rits19 &
  • …
  • Volkmar Lotz19 
  • Conference paper
  • 692 Accesses

  • 5 Citations

Part of the Lecture Notes in Computer Science book series (LNISA,volume 4127)

Abstract

The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for composite applications should be provided. Such a policy is based on the policies of the corresponding autonomous sub-applications and has the following properties: On the one hand, it needs to be as restrictive as possible to block requests which do not comply with the integrated sub-applications’ policies. Thereby, unsuccessful executions of requests are prevented at an early stage. On the other hand, the composite policy must grant all necessary privileges in order to make the intended functionality available to legitimate users.

In this paper, we present our formal model and respective algorithmic solutions for consolidating the access control of composite applications. The generated policies conform to the presented requirements of the least privileges paradigm and, thus, allow to revise and optimize the access control of composite applications. We demonstrate this by means of Web service workflows that constitute the state of the art for the realization of business processes.

Keywords

  • Access Control
  • Business Process
  • Access Control Policy
  • Disjunctive Normal Form
  • Role Base Access Control

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Chapter PDF

Download to read the full chapter text

References

  1. Wimmer, M., Albutiu, M.-C., Kemper, A.: Optimized Workflow Authorization in Service Oriented Architectures. In: Müller, G. (ed.) ETRICS 2006. LNCS, vol. 3995, pp. 30–44. Springer, Heidelberg (2006)

    CrossRef  Google Scholar 

  2. Bonatti, P., De Capitani di Vimercati, S., Samarati, P.: An Algebra for Composing Access Control Policies. ACM Transactions on Information and System Security (TISSEC) 5(1), 1–35 (2002)

    CrossRef  Google Scholar 

  3. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer 29(2), 38–47 (1996)

    CrossRef  Google Scholar 

  4. ANSI INCITS 359-2004, Role Based Access Control. American National Standards Institute, Inc. (ANSI), New York, NY, USA (February 2004)

    Google Scholar 

  5. Nadalin, A., et al.: Web Services Secure Conversation Language (WS-SecureConversation) (February 2005), http://www-128.ibm.com/developerworks/library/specification/ws-secon/

  6. Guo, S., Sun, W., Weiss, M.A.: Solving Satisfiability and Implication Problems in Database Systems. ACM Trans. Database Syst. 21(2), 270–293 (1996)

    CrossRef  Google Scholar 

  7. Wijesekera, D., Jajodia, S.: A Propositional Policy Algebra for Access Control. ACM Transactions on Information and System Security (TISSEC) 6(2), 286–325 (2003)

    CrossRef  Google Scholar 

  8. Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible Support for Multiple Access Control Policies. ACM Transactions on Information and System Security (TISSEC) 26(2), 214–260 (2001)

    MATH  Google Scholar 

  9. Adam, N.R., Atluri, V., Huang, W.-K.: Modeling and Analysis of Workflows Using Petri Nets. Journal of Intell. Inf. Syst. 10(2), 131–158 (1998)

    CrossRef  Google Scholar 

  10. Bettini, C., Wang, X.S., Jajodia, S.: Temporal Reasoning in Workflow Systems. Distrib. Parallel Databases 11(3), 269–306 (2002)

    CrossRef  MATH  Google Scholar 

  11. Gudes, E., Olivier, M.S., van de Riet, R.P.: Modelling, Specifying and Implementing Workflow Security in Cyberspace. Journal of Computer Security 7(4), 287–315 (1999)

    CrossRef  Google Scholar 

  12. Huang, W.-K., Atluri, V.: SecureFlow: a Secure Web-enabled Workflow Management System. In: RBAC 1999: Proceedings of the 4th ACM Workshop on Role-based Access Control, pp. 83–94. ACM Press, New York (1999)

    Google Scholar 

  13. Atluri, V., Huang, W.-K., Bertino, E.: A Semantic-Based Execution Model for Multilevel Secure Workflows. Journal of Computer Security 8(1) (2000)

    Google Scholar 

  14. Bertino, E., Ferrari, E., Atluri, V.: The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Trans. Inf. Syst. Secur. 2, 65–104 (1999)

    CrossRef  Google Scholar 

  15. Rits, M., Boe, B.D., Schaad, A.: Xact: a Bridge between Resource Management and Access Control in Multi-layered Applications. In: SESS 2005: Proceedings of the 2005 Workshop on Software Engineering for Secure Systems, pp. 1–7. ACM Press, New York (2005)

    Google Scholar 

  16. Wimmer, M., Eberhardt, D., Ehrnlechner, P., Kemper, A.: Reliable and Adaptable Security Engineering for Database-Web Services. In: Koch, N., Fraternali, P., Wirsing, M. (eds.) ICWE 2004. LNCS, vol. 3140, pp. 502–515. Springer, Heidelberg (2004)

    CrossRef  Google Scholar 

  17. Advanced Technologies for interoperability of Heterogeneous Enterprise Networks and their Applications (ATHENA), European project. Project homepage: http://www.athena-ip.org

Download references

Author information

Authors and Affiliations

  1. Technische Universität München, 85748, Garching b. München, Germany

    Martin Wimmer & Alfons Kemper

  2. SAP Research, Font de l’Orme, 06250, Mougins, France

    Maarten Rits & Volkmar Lotz

Authors
  1. Martin Wimmer
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Alfons Kemper
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Maarten Rits
    View author publications

    You can also search for this author in PubMed Google Scholar

  4. Volkmar Lotz
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Dipartimento di Tecnologie dell’Informazione, Università degli Studi di Milano, Italy

    Ernesto Damiani

  2. The Logistics Institute, Northeastern University, Shenyang, China

    Peng Liu

Rights and permissions

Reprints and Permissions

Copyright information

© 2006 IFIP International Federation for Information Processing

About this paper

Cite this paper

Wimmer, M., Kemper, A., Rits, M., Lotz, V. (2006). Consolidating the Access Control of Composite Applications and Workflows. In: Damiani, E., Liu, P. (eds) Data and Applications Security XX. DBSec 2006. Lecture Notes in Computer Science, vol 4127. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11805588_4

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/11805588_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-36796-3

  • Online ISBN: 978-3-540-36799-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature