Research

Modelling workflow executions under role-based authorisation control


Reference:

He, L., Duan, K., Chen, X., Zou, D., Han, Z., Fadavinia, A. and Jarvis, S. A., 2011. Modelling workflow executions under role-based authorisation control. In: Proceedings - 2011 IEEE International Conference on Services Computing, SCC 2011. Piscataway, NJ: IEEE, pp. 200-208.

Related documents:

This repository does not currently have the full-text of this item.
You may be able to access a copy if URLs are provided below.

Official URL:

http://dx.doi.org/10.1109/SCC.2011.56

Abstract

Workflows are often used to represent enterprise-type activities, and authorisation control is an important security consideration in enterprise-level applications. Role-Based Access Control (RBAC) is a popular authorisation control scheme under which users are assigned to certain roles, and the roles are associated with permissions. This paper presents a novel mechanism for modelling workflow execution in cluster-based resource pools under Role-Based Access Control (RBAC) schemes. Our modelling approach uses Coloured Timed Petri-Nets, and various authorisation constraints are modelled, including role constraints, temporal constraints, cardinality constraints, Binding of Duty and Separation of Duty constraints, etc. The interactions between workflow authorisation and workflow execution are also captured in the model. In this paper, the modelling mechanism is developed in such a fashion that the construction of the authorisation model for a workflow can be automated. This feature is very helpful in modelling a large collection of authorisation policies or complex workflows. A Petri-net simulation tool, the CPN-Tool, is utilised to implement the developed modelling mechanism and simulate the constructed model. Both system-level performance (e.g., utilisation of resource pools) and application-level performance (e.g., workflow response time) can be obtained from model simulations. This work can be used to plan system capacity and investigate the impact of authorization policies on system and application performance.

Details

Item Type Book Sections
CreatorsHe, L., Duan, K., Chen, X., Zou, D., Han, Z., Fadavinia, A. and Jarvis, S. A.
DOI10.1109/SCC.2011.56
DepartmentsFaculty of Science > Computer Science
StatusPublished
ID Code26417
Additional Information2011 IEEE International Conference on Services Computing, SCC 2011. 4-9 July 2011. Washington, DC, United States.

Export

Actions (login required)

View Item