Run-time monitors are crucial to the development of security-aware workflow management systems, which are at the heart of modern e-services and need to mediate access to their resources by imposing authorisation constraints (e.g., separation of duty). In this paper, we propose a new methodology to build run-time monitors capable of ensuring the successful termination of workflows subject to authorisation constraints. The methodology is based on state-of-the-art satisfiability modulo theories techniques.
A SMT-based methodology for monitoring of security-aware workflows / Bertolissi, C.; Ranise, S.. - In: INTERNATIONAL JOURNAL OF INTERNET TECHNOLOGY AND SECURED TRANSACTIONS. - ISSN 1748-569X. - 5:3(2014), pp. 275-290. [10.1504/IJITST.2014.065188]
A SMT-based methodology for monitoring of security-aware workflows
Ranise S.
2014-01-01
Abstract
Run-time monitors are crucial to the development of security-aware workflow management systems, which are at the heart of modern e-services and need to mediate access to their resources by imposing authorisation constraints (e.g., separation of duty). In this paper, we propose a new methodology to build run-time monitors capable of ensuring the successful termination of workflows subject to authorisation constraints. The methodology is based on state-of-the-art satisfiability modulo theories techniques.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione