Abstract
Mutual exclusion and binding constraints are important means to define which combinations of subjects and roles can be assigned to the tasks that are included in a business process. Due to the combinatorial complexity of potential role-to-subject and task-to-role assignments, there is a strong need to systematically check the consistency of a given set of constraints. In this paper, we discuss the detection of consistency conflicts and provide resolution strategies for the corresponding conflicts.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ahn, G., Sandhu, R.: Role-based Authorization Constraints Specification. ACM Transactions on Information and System Security (TISSEC) 3(4) (November 2000)
Baliosian, J., Serrat, J.: Finite State Transducers for Policy Evaluation and Conflict Resolution. In: Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks (June 2004)
Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security (TISSEC) 2(1) (1999)
Botha, R.A., Eloff, J.H.: Separation of duties for access control enforcement in workflow environments. IBM Systems Journal 40(3) (2001)
Casati, F., Castano, S., Fugini, M.: Managing Workflow Authorization Constraints through Active Database Technology. Information Systems Frontiers 3(3) (2001)
Ferraiolo, D., Barkley, J., Kuhn, D.: A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet. ACM Transactions on Information and System Security (TISSEC) 2(1) (February 1999)
Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-Based Access Control, 2nd edn. Artech House (2007)
Jaeger, T., Sailer, R., Zhang, X.: Resolving constraint conflicts. In: Proc. of the Ninth ACM Symposium on Access Control Models and Technologies, SACMAT (2004)
Moffett, J.D., Sloman, M.S.: Policy Hierarchies for Distributed Systems Management. IEEE Journal on Selected Areas in Communications 11(9) (1993)
Moffett, J.D., Sloman, M.S.: Policy Conflict Analysis in Distributed System Management. Journal of Organizational Computing 4(1) (1994)
Feinstein, H., Sandhu, R., Coyne, E., Youman, C.: Role-based access control models. IEEE Computer 29(2) (1996)
Schaad, A.: Detecting Conflicts in a Role-Based Delegation Model. In: Proceedings of the 17th Annual Computer Security Applications Conference, ACSAC (December 2001)
Sloman, M.S.: Policy Driven Management for Distributed Systems. Journal of Network and Systems Management 2(4) (1994)
Strembeck, M., Mendling, J.: Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context. In: Meersman, R., Dillon, T.S., Herrero, P. (eds.) OTM 2010. LNCS, vol. 6426, pp. 204–221. Springer, Heidelberg (2010)
Strembeck, M., Mendling, J.: Modeling Process-related RBAC Models with Extended UML Activity Models. Information and Software Technology 53(5) (2011)
Tan, K., Crampton, J., Gunter, C.A.: The Consistency of Task-Based Authorization Constraints in Workflow Systems. In: Proceedings of the 17th IEEE workshop on Computer Security Foundations (June 2004)
Wainer, J., Barthelmess, P., Kumar, A.: W-RBAC - A workflow security model incorporating controlled overriding of constraints. International Journal of Cooperative Information Systems (IJCIS) 12(4) (2003)
Wang, H., Sun, L., Varadharajan, V.: Purpose-based access control policies and conflicting analysis. In: Rannenberg, K., Varadharajan, V., Weber, C. (eds.) SEC 2010. IFIP AICT, vol. 330, pp. 217–228. Springer, Heidelberg (2010)
Warner, J., Atluri, V.: Inter-instance authorization constraints for secure workflow management. In: Proc. of the Eleventh ACM Symposium on Access Control Models and Technologies, SACMAT (June 2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Schefer, S., Strembeck, M., Mendling, J., Baumgrass, A. (2011). Detecting and Resolving Conflicts of Mutual-Exclusion and Binding Constraints in a Business Process Context. In: Meersman, R., et al. On the Move to Meaningful Internet Systems: OTM 2011. OTM 2011. Lecture Notes in Computer Science, vol 7044. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25109-2_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-25109-2_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25108-5
Online ISBN: 978-3-642-25109-2
eBook Packages: Computer ScienceComputer Science (R0)