To support the re-use of business process models, an emerging trend in Business Process Management, it is crucial to assist customers during deployment. We study how to do this for an important class of business processes, called security-sensitive workflows, in which execution constraints on the tasks are complemented with authorization constraints (e.g., Separation of Duty) and authorization policies (constraining which users can execute which tasks).We identify the capability of solving Scenario Finding Problems (SFPs), i.e. finding concrete execution scenarios, as crucial in supporting the re-use of security-sensitive workflows. Solutions of SFPs provide evidence that the business process model can be successfully executed under the policy adopted by the customer. We present a technique for solving two SFPs and validate it on real-world business process models taken from an on-line library.

Assisting the deployment of security-sensitive workflows by finding execution scenarios / dos Santos, D. R.; Ranise, S.; Compagna, L.; Ponta, S. E.. - 9149:(2015), pp. 85-100. ((Intervento presentato al convegno 29th IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec 2015 tenutosi a usa nel 2015 [10.1007/978-3-319-20810-7_6].

Assisting the deployment of security-sensitive workflows by finding execution scenarios

Ranise S.;
2015-01-01

Abstract

To support the re-use of business process models, an emerging trend in Business Process Management, it is crucial to assist customers during deployment. We study how to do this for an important class of business processes, called security-sensitive workflows, in which execution constraints on the tasks are complemented with authorization constraints (e.g., Separation of Duty) and authorization policies (constraining which users can execute which tasks).We identify the capability of solving Scenario Finding Problems (SFPs), i.e. finding concrete execution scenarios, as crucial in supporting the re-use of security-sensitive workflows. Solutions of SFPs provide evidence that the business process model can be successfully executed under the policy adopted by the customer. We present a technique for solving two SFPs and validate it on real-world business process models taken from an on-line library.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
Springer Verlag
978-3-319-20809-1
978-3-319-20810-7
dos Santos, D. R.; Ranise, S.; Compagna, L.; Ponta, S. E.
Assisting the deployment of security-sensitive workflows by finding execution scenarios / dos Santos, D. R.; Ranise, S.; Compagna, L.; Ponta, S. E.. - 9149:(2015), pp. 85-100. ((Intervento presentato al convegno 29th IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec 2015 tenutosi a usa nel 2015 [10.1007/978-3-319-20810-7_6].
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11572/333111
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 3
  • ???jsp.display-item.citation.isi??? 3
social impact