DocumentCode
3404297
Title
Verification of Access Control Policies for REA Business Processes
Author
Karimi, Vahid R. ; Cowan, Donald D.
Author_Institution
David R. Cheriton Sch. of Comput. Sci., Univ. of Waterloo, Waterloo, ON, Canada
Volume
2
fYear
2009
fDate
20-24 July 2009
Firstpage
422
Lastpage
427
Abstract
Access control is a significant aspect of security and constitutes an important component of operating systems, database management systems (DBMS), and applications. Access control policies define which users have access to what objects and operations and describe any existing constraints. These policies are not only different from one organization to another but also change over time, even in a single organization. We examine the integration, not necessarily the inclusion, of these policies into business processes and consider such effects as consistency. Determining the effects of these policies can become difficult because several such policies exist, and taking into account all possible combinations or executions of these policies is tedious and error-prone. In addition, the number of policies usually increases over time and adds to the complexity of analyzing their combinations. It is acknowledged in the literature that what you specify is what you get, but that is not necessarily what you want. To show our approach, we specify certain access control policies for Resource--Event--Agent (REA) business processes and examine the addition and combination of these policies. More specifically, we illustrate the principal of separation of duties (e.g., two separate individuals must authorize ordering items and paying for them). Our main contribution is the verification of access control policies in conjunction with a REA business process.
Keywords
authorisation; business data processing; resource allocation; software agents; access control policy verification; database management system; operating system; resource event agent business process; Access control; Application software; Computer applications; Computer science; Computer security; Data security; Database systems; Operating systems; Permission; Safety; Access control policies; Alloy; REA business processes; Resource--Event--Agent (REA); Safety; Separation of duties; Value chains; Verification;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Software and Applications Conference, 2009. COMPSAC '09. 33rd Annual IEEE International
Conference_Location
Seattle, WA
ISSN
0730-3157
Print_ISBN
978-0-7695-3726-9
Type
conf
DOI
10.1109/COMPSAC.2009.170
Filename
5254063
Link To Document