A Verification Mechanism for Secured Message Processing in Business Collaboration
Message processing can become unsecured resulting in unreliable business collaboration in terms of authorization policy conflicts, for example, when (1) incorrect role assignment or modification occurs in a partner’s services or (2) messages transferred from one organization are processed by unqualified roles in other collaborating business participants. Therefore, verification mechanism based on access policies is critical for managing secured message processing in business collaboration. In this paper, we exploit a role authorization model, Role-Net, which is developed based on Hierarchical Colored Petri Nets (HCPNs) to specify and manage role authorization in business collaboration. A property named Role Authorization Based Dead Marking Freeness is defined based on Role-Net to verify business collaboration reliability according to partners’ authorization policies. An algebraic verification method for secured message processing is introduced as well.
KeywordsRole Authorization Reliability Verification Secured Message Processing Hierarchical Colored Petri Net
Unable to display preview. Download preview PDF.
- 4.Ferraiolo, D., Cugini, J., Kuhn, R.: Role Based Access Control: Features and Motivations. In: Proceedings of ACSAC (1995)Google Scholar
- 6.Sun, H., Wang, X., Yang, J., Zhang, Y.: Authorization Policy Based Business Collaboration Reliability Verification. In: Proceedings of ICSOC, pp. 579–584 (2008)Google Scholar
- 7.Song, Y., Lee, J.: Deadlock Analysis of Petri Nets Using the Transitive Matrix. In: Proceedings of the SICE Annual Conference, pp. 689–694 (2002)Google Scholar
- 8.Paci, F., Ouzzani, M., Mecella, M.: Verification of Access Control Requirements in Web Services Choreography. In: Proceedings of the IEEE International Conference on Service Computing, pp. 5–12 (2008)Google Scholar
- 9.Bertino, E., Crampton, J., Paci, F.: Access Control and Authorization Constraints for WS-BPEL. In: Proceedings of the IEEE International Conference on Web Services, pp. 275–284 (2006)Google Scholar
- 10.Liu, P., Chen, Z.: An Access Control Model for Web Services in Business Process. In: Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence, pp. 292–298 (2004)Google Scholar