• DocumentCode
    3404297
  • Title

    Verification of Access Control Policies for REA Business Processes

  • Author

    Karimi, Vahid R. ; Cowan, Donald D.

  • Author_Institution
    David R. Cheriton Sch. of Comput. Sci., Univ. of Waterloo, Waterloo, ON, Canada
  • Volume
    2
  • fYear
    2009
  • fDate
    20-24 July 2009
  • Firstpage
    422
  • Lastpage
    427
  • Abstract
    Access control is a significant aspect of security and constitutes an important component of operating systems, database management systems (DBMS), and applications. Access control policies define which users have access to what objects and operations and describe any existing constraints. These policies are not only different from one organization to another but also change over time, even in a single organization. We examine the integration, not necessarily the inclusion, of these policies into business processes and consider such effects as consistency. Determining the effects of these policies can become difficult because several such policies exist, and taking into account all possible combinations or executions of these policies is tedious and error-prone. In addition, the number of policies usually increases over time and adds to the complexity of analyzing their combinations. It is acknowledged in the literature that what you specify is what you get, but that is not necessarily what you want. To show our approach, we specify certain access control policies for Resource--Event--Agent (REA) business processes and examine the addition and combination of these policies. More specifically, we illustrate the principal of separation of duties (e.g., two separate individuals must authorize ordering items and paying for them). Our main contribution is the verification of access control policies in conjunction with a REA business process.
  • Keywords
    authorisation; business data processing; resource allocation; software agents; access control policy verification; database management system; operating system; resource event agent business process; Access control; Application software; Computer applications; Computer science; Computer security; Data security; Database systems; Operating systems; Permission; Safety; Access control policies; Alloy; REA business processes; Resource--Event--Agent (REA); Safety; Separation of duties; Value chains; Verification;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Software and Applications Conference, 2009. COMPSAC '09. 33rd Annual IEEE International
  • Conference_Location
    Seattle, WA
  • ISSN
    0730-3157
  • Print_ISBN
    978-0-7695-3726-9
  • Type

    conf

  • DOI
    10.1109/COMPSAC.2009.170
  • Filename
    5254063