Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios

  • Daniel R. dos Santos
  • Silvio Ranise
  • Luca Compagna
  • Serena E. Ponta
Conference paper

DOI: 10.1007/978-3-319-20810-7_6

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9149)
Cite this paper as:
dos Santos D.R., Ranise S., Compagna L., Ponta S.E. (2015) Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios. In: Samarati P. (eds) Data and Applications Security and Privacy XXIX. DBSec 2015. Lecture Notes in Computer Science, vol 9149. Springer, Cham

Abstract

To support the re-use of business process models, an emerging trend in Business Process Management, it is crucial to assist customers during deployment. We study how to do this for an important class of business processes, called security-sensitive workflows, in which execution constraints on the tasks are complemented with authorization constraints (e.g., Separation of Duty) and authorization policies (constraining which users can execute which tasks). We identify the capability of solving Scenario Finding Problems (SFPs), i.e. finding concrete execution scenarios, as crucial in supporting the re-use of security-sensitive workflows. Solutions of SFPs provide evidence that the business process model can be successfully executed under the policy adopted by the customer. We present a technique for solving two SFPs and validate it on real-world business process models taken from an on-line library.

Copyright information

© IFIP International Federation for Information Processing 2015

Authors and Affiliations

  • Daniel R. dos Santos
    • 1
    • 2
    • 3
  • Silvio Ranise
    • 1
  • Luca Compagna
    • 2
  • Serena E. Ponta
    • 2
  1. 1.Fondazione Bruno Kessler (FBK)TrentoItaly
  2. 2.SAP Labs FranceMouginsFrance
  3. 3.University of TrentoTrentoItaly

Personalised recommendations