Design of An Integrated Role-Based Access Control Infrastructure For Adaptive Work Ow Systems
Design of An Integrated Role-Based Access Control Infrastructure For Adaptive Work Ow Systems
Design of An Integrated Role-Based Access Control Infrastructure For Adaptive Work Ow Systems
net/publication/47397222
CITATIONS READS
5 168
1 author:
Nanjangud Narendra
Ericsson, Bangalore, India
132 PUBLICATIONS 1,456 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
Data Graph, Information Graph, Knowledge Graph and Wisdom Graph based Semantics Modeling, Synthesis and Analysis Approach View project
All content following this page was uploaded by Nanjangud Narendra on 20 May 2014.
Nanjangud C. Narendra
IBM Software Labs, Bangalore, India
With increasing numbers of organizations automating a 3-tier adaptive workflow architecture (Naren-
their business processes by using workflow systems, dra, 2000), we define a similar 3-tier RBAC in-
security aspects of workflow systems has become a
heavily researched area. Also, most workflow processes frastructure that mirrors our adaptive workflow
nowadays need to be adaptive, i.e., constantly chang- architecture. We also describe the mappings be-
ing, to meet changing business conditions. However, tween them, and we show how this mapping can
little attention has been paid to integrating Security and be used to manage organizational RBAC con-
Adaptive Workflow. In this paper, we investigate this
important research topic, with emphasis on Role-Based straints when the workflows are being adapted
Access Control (RBAC) in Adaptive Workflow. Based continuously. In fact, we believe that ours is the
on our earlier work on a 3-tier adaptive workflow archi- first attempt at integrating Security and Adap-
tecture, we present the design of a similar 3-tier RBAC
infrastructure, and we show that it conceptually mirrors tive Workflow.
our adaptive workflow architecture. We also describe the
mappings between them, and we show how this mapping This paper is organized as follows. In the next
can be used to manage organizational RBAC constraints Section, we provide an introduction to Work-
when the workflows are being adapted continuously. We flow and Adaptive Workflow, where we present
illustrate our ideas throughout the paper with a simple
yet non-trivial example. our 3-tier adaptive workflow architecture. In
Section 3, we present the latest research re-
Keywords: security, role based access control, adaptive sults in Secure Workflow on which our work
workflow. is based. The main result of this paper, i.e.,
our 3-tier RBAC infrastructure, is presented in
Section 4. Section 5 concludes the paper with
1. Introduction directions for future research. We also illustrate
our ideas throughout the paper using, a simple
yet non-trivial example.
Increasing numbers of organizations are au-
tomating their business processes by installing
and using workflow systems. This has raised
several research issues regarding security as- 2. Workflow Preliminaries
pects of these workflow systems. Hence Se-
cure Workflow has become a fertile research
area Atluri, et.al., 2000; Bertino, et.al., 1999; 2.1. Introduction to Workflow
Cholewka, et.al,. 2000; Nyanchama and Os-
born, 1999). However, most workflow pro- Our basic workflow model is based on the
cesses nowadays need to be adaptive, i.e. con- graph-theoretic notions in the OpenPM (Shan,
stantly changing, to meet changing business et.al., 1997) process model. We assume that
conditions. In this paper, we address this impor- each workflow instance is a directed graph W
tant topic, with emphasis on Role-Based Access = <N,E>, where N is the set of nodes and E
Control (RBAC). Based on our earlier work on is the set of edges. Each edge e in E is a tuple
294 Design of an Integrated Role-Based Access Control
of the form < nbegin , nend >, where the edge is rect the flow of control to specific work nodes
directed from nbegin to nend . or route nodes.
We first define two unique nodes — START For each work node, we assume the existence
and END nodes; for each workflow, there will of specific data structures that capture the data
be only one of each kind. A START node has no flow information with the node. In other words,
predecessor, and an END node has no successor. each work node is assumed to perform certain
operations on data and artifacts (e.g., complete
The workflow graph is assumed to obey two
a form, collate and summarize data, etc.). These
simple conditions:
operations, together with the data flow, define
Every node in the graph is reachable from the flow of control throughout the workflow;
the START node, i.e., there is a path from the and this is a consequence of the workflow de-
START node to every other node in the graph sign.
The END node is reachable from every node In our workflow model, edges are of four kinds
in the graph, i.e., there is a path from the node — forward edge, loop edge, soft-sync edge and
to the END node strict-sync edge. Forward edges depict the nor-
mal workflow execution, which is in a forward
Nodes are of two kinds — work nodes and route direction. Loop edges are backward pointing
nodes. Work nodes are nodes that actually per- edges that are used to depict the repeated exe-
form the activities in the workflow. Route nodes cution of loops.
are nodes whose only function is to evaluate
rules (i.e., boolean conditions) and, depending The “sync” edges are quite different from for-
on the result of the evaluation, these nodes di- ward edges, in that these edges are used to
C
Route Node
E
B
Forward
Edge D
Soft-Sync
Edge
START A
H
Strict-Sync
Edge
F
G
Work Node
END
Loop Edge
An example of workflow graph that illustrates Basic Workflow Model — stores the instances
of our workflow model
all these definitions, is shown in Figure 1. The
arcs depict the flow of the data and artifacts Workflow Change Model — stores the con-
from the START to the END node. structs for specifying dynamic workflow
changes
We can also define states for each node, de-
pending on where it is during the workflow ex- Workflow Change Verifier — performs the
ecution. Hence we define the following states syntactic and semantic checking for work-
for nodes: NOT-ACTIVATED, ACTIVATED, flow adaptation
DONE, FAILED, SUSPENDED. Workflow–Schema Interface Manager — in-
terface module that interacts with the Schema
The definition of these states naturally leads to
Layer
the conclusion that we can define the state tran-
sition diagram that each node has to obey. In- Adaptivity at schema level: here, the work-
deed, this means that the state of every node in flow schema will need to be modified – this
the workflow instance is governed by the tran- would arise if certain “ways of doing things”
sition rules in the state transition diagram. This change, and will necessitate radical modifica-
diagram is given in Figure 2. tions to all the workflow instances of the schema
in question. The modules that implement this
are:
Schema Handler — creates, versions and
ACTIVATED
CO
MM
stores the workflow schema
IT
Schema Migration Manager — handles mi-
T
DONE
AR
SUSPEND
RESUME
ST
in response to changing environmental condi- either fully or partially — the goals that
tions – this could cause radical changes in the he/she has specified.
schema themselves, which could cause disrup-
tive changes in the workflow instances. The Workflow Design Module — with this mod-
modules that implement this are: ule, and with the goal and workflow informa-
tion from the Goal Specification Module and
Organizational Workflow Repository — or- the Organizational Workflow Repository, the
ganization-wide repository of all workflow workflow designer can design the workflow
processes stored into the system; stores the
schema. He/she will then check it into the
workflow schemas and their instances, and
Organizational Workflow Repository. The
also stores the goals that led to the creation
of the workflow in the first place. schema will be transferred into the Schema
Handler via the Schema-Plannng Interface
Goal Specification Module — through this Manager where it will be appropriately ver-
module, the workflow designer first enters sioned and stored. The appropriate version
the goals that the workflow has to satisfy. number is then communicated to the user.
He/she can then look into the Organiza-
tional Workflow Repository, for reusing any The architecture is pictorially depicted in Figure
workflows from the past that can satisfy — 3.
User
s
PLANNING
WF Goal LAYER
Design Specification
Module Module WF
Repository
SCHEMA
Schema LAYER
Migration Schema
Manager Handler
Workflow INSTANCE
Change LAYER
Verifier Basic Workflow
Workflow Change Model
Model
3.1. Preliminaries
MaxRole
Employee1 Employee2
{1} {2}
MinRole
The following algorithms for Role management Privilege Deletion — a privilege is deleted
have been provided in (Nyanchama and Osborn, from a Role
1999): Edge Insertion — a new reporting relation-
Role Addition with only direct privileges — ship between a Role and one of its Senior Roles
a Role is added to the Role Graph along with its is added
direct privileges only Edge Deletion — a reporting relationship
between a Role and one of its Senior Roles is
Role Addition with inherited privileges — a deleted.
Role is added to the Role Graph along with its
direct and inherited privileges All Addition algorithms also contain steps for
checking for the 4 types of conflicts described
Role Deletion — a Role is deleted from the above, and will abort with an error message
Role Graph; this would also involve either dele- in case a conflict is detected. The algorithms
tion or re-allocation of the direct privileges as- also incorporate mechanisms for detecting cy-
sociated with the Role cles in the Role Graph, in which case they will
abort with an error message. For details, please
Privilege Addition — a privilege is added to see the original paper (Nyanchama and Osborn,
a Role 1999).
Design of an Integrated Role-Based Access Control 299
Please note that “negative authorizations” (for Munawer, 1997); however, this issue is out of
example, as specified in Damianou, et.al., 2001), the scope of this paper.
viz., that a Role cannot access a particular priv- A very good overall introduction to security is-
ilege, are implicitly incorporated into the Role sues in workflow can be obtained from (Atluri,
Graph by simply ensuring that the privilege in 2002).
question does not appear along with the Role
in the Role Graph. In other words, by default, Recently, the RBAC model has been extended to
a Role has only negative authorizations, unless include dynamic aspects, i.e., Temporal RBAC
and until any particular privileges are assigned (Bertino and Bonatti, 2001). This model sup-
at workflow execution time before the workflow straints can also include the DSOD and SSOD
task is executed. constraints as defined in Section 3.1.
A similar model is presented in (Huand and This model provides for both positive and nega-
Atluri, 1999). In this model, a Workflow Au- tive authorizations for roles (resp. users), which
thorization Template is attached to each task in are referred to as “Obliged Roles (resp. Users)”
the workflow. This template grants appropriate and “Denied Roles (resp. Users)”. The con-
authorizations only when the task starts and re- straint specification results in the creation of a
vokes it once the tasks has finished. More than Constraint Base, whose consistency is checked
one Template can be assigned to a task in case for ensuring that the roles (and users) belong-
more than one user needs to execute the task. ing to the “Obliged” category to execute a task,
if any, do not belong to the set of roles (and
The area of Multilevel Secure (MLS) Work- users) belonging to the “Denied” category for
flows is an offshoot of Secure Workflow, and that task, and vice versa.
is concerned with modeling workflows when
different tasks in the workflow are at different Hence the model proposes an algorithm for
security levels. More details can be found from user-task allocation, whose inputs are the fol-
Atluri, et.al., 2000; Kang, et.al., 1999); how- lowing:
ever, MLS workflows are out of the scope of The Global SSOD & DSOD Security Con-
this paper. straints are represented in the Constraint Base
(CB)
In this paper, we assume the existence of a sin-
gle Workflow Administrator who has the abil- The User-Role Mapping
ity and the authority to define/adapt and deploy
the workflows on the workflow system. This The Role Graph as described in Section 3.1,
would, of course, raise the issue of having a hi- which depicts the Role-Task Assignment
erarchy of workflow administrators, each with The output of the algorithm is the user-task
privileges over certain workflows (Sandhu and allocation for the workflow, which will be the
300 Design of an Integrated Role-Based Access Control
input to our algorithm to be described in Section the users in the organization. This assignment
4.4. is also based on an understanding of the overall
For our purposes, we redefine the “Obliged business goals of the organization, and also on
Roles (resp. Users)” as “Authorized Roles the kinds of tasks that each role would need to
(resp. Users)”, where Authorized essentially
execute.
refers to the direct privileges for tasks the Role Hence, actual role-task assignment is done
(resp. user) can access. Hence we redefine at the time of workflow instance definition, i.e.,
“Denied Roles (resp. Users)” as those that when instances are created out of the schemas.
do not belong to the “Authorized Roles (resp. This is similar in approach to the TBAC model
Users)” set. as described in (Thomas and Sandhu, 1997) and
In this section, we have only briefly introduced introduced in Section 3.1.
the algorithm; for more details, please refer to Hence, depending on the nature of the adapta-
the original paper (Bertino, et.al., 1999). We tion, the appropriate RBAC-related assignments
have also not described the SSOD and DSOD may need to be modified in order to ensure that
constraints more formally here, since they are the modified workflow process can be executed
already described in (Bertino, et.al., 1999); with the users available:
moreover, our emphasis is on the 3-tier RBAC
infrastructure itself. For changes at instance level, only role-task
assignments may need to be modified, in order
to ensure that all tasks in the modified work-
4. Our Approach to RBAC in Adaptive flow instance can be performed. For example,
Workflow junior managers can be temporarily provided
with permission to approve certain purchases
if the change in the workflow instance results
Major motivation behind our approach is to try in the non-availability of a senior manager to
to answer the following question: given our perform the approval task.
3-tier adaptive workflow architecture, what is
the appropriate RBAC infrastructure that would For changes at schema level, one of the two
“mirror” our adaptive workflow architecture? types of changes can be made:
In other words, for each level of adaptivity- User-role assignments may need to be mod-
instance, schema, planning — what would be ified instead of mere role-task assignment
the appropriate RBAC-related modifications to changes. For example, a particular set of
make? individuals may be assigned the senior man-
To answer this question, we revisit the 3-tier ager role, so that they can (permanently)
model of (Nyanchama and Osborn, 1999) de- approve the purchases. This modification
scribed in Section 3.1. We recast this model as could also affect the role-task assignments,
the following 3-tier RBAC model: which may also need to be changed to reflect
the changed user-role assignments.
Global SSOD & DSOD Constraints
Global SSOD & DSOD constraints may need
User-Role Assignment to be modified.
Role-Task Assignment The reason why user-role assignments have
This model maps naturally onto our 3-tier adap- been mapped to the workflow schema level is
tive workflow architecture: that user-role assignments are typically more
radical and far-reaching than role-task assign-
When business goals are set for workflow ments in most organizations. For example, pro-
processes, the task of planning and scheduling moting a junior manager to the senior manager
these processes should take into account the role means that he/she automatically has access
global SSOD & DSOD constraints while the rights to all the tasks that the senior manager can
workflow schema is being defined perform in all future workflow instances deriv-
For workflow schema definition, the most ing from the adapted workflow schema. On the
crucial RBAC-related action that needs to be other hand, temporarily providing him/her with
performed, is to assign the appropriate roles to some of the senior manager privileges for only
Design of an Integrated Role-Based Access Control 301
a particular workflow instance, has much less limit. Such changes in constraints could also af-
impact on the organization. fect the user-role assignments, which could, in
turn, affect the role-task assignments.
The case is similar for SSOD & DSOD con-
straint modification. If either of the above two Of course, our model may be an over-simplifica-
types of changes is made, then the impact on tion in many cases, but it provides one way to
the organization will be far greater than merely effectively manage RBAC-related inconsisten-
changing role-task assignments. cies that could arise due to workflow changes.
For changes of business goals resulting in The example to be introduced later in this Sec-
widespread workflow schema changes, the glo- tion will illustrate these concepts and show the
bal SSOD & DSOD constraints may also need efficacy of our model.
to be modified, in addition to modifying the
user-role assignments. That is, these two types
of changes are far more disruptive than either
one of them acting alone. This is because, 4.1. Modified Adaptive Workflow
as explained above, global constraints typically Architecture
define the very basic constraints under which
the organization functions; changing these con- Based on the above mapping, the Planning
straints could lead to major changes in the or- Layer of our 3-tier adaptive workflow architec-
ganization structure itself. ture (depicted in Figure 3) is modified as shown
in Figure 6.
One example of change in a global constraint
is that approval for certain purchases below a Since global SSOD & DSOD constraints are es-
certain amount may no longer be required. Al- sentially limitations on how the workflow will
ternatively, an additional SSOD constraint may meet the user-specified goals, they are derived
be introduced that restricts a person from being from the goals via the Goal Specification Mod-
a junior manager and also from being granted ule, and are specified in the Security Mod-
permission to approve purchases above a certain ule. In this module, the Global Constraints
Users
WF
Repository
Security Module Global Constraint
Specification
User-Role Assignment
Role-Task Assignment
To Schema Layer
are specified in the Global Constraint Specifica- will be used only for the intended purpose, i.e.,
tion Module, which will also contain a consis- house building.
tency checker for ensuring consistency among This workflow is then adapted in order to pro-
the constraints. This will also involve setting duce the following workflow as depicted in Fig-
the User-Role and Role-Task assignments. ure 8.
Hence we see that the main adaptations are:
4.2. Our Example A Junior Manager’s initial approval is addition-
ally required, before additional processing can
We select a simple yet non-trivial example of be done on the loan application.
housing loan approvals at a bank (this is a sim- The document examination and assessor’s eval-
plified version of the process that the author uation tasks are parallelized for efficiency; there
himself had to go through while obtaining a is also a strict-sync edge from task #5 to task
housing loan at an Indian bank). We assume #4, signifying that House Assessment should be
the existence of the following roles in the Hous- completed successfully before Documents Ex-
ing Loans department: Department Manager, amination is executed.
Junior Managers, and Clerks. The initially fol-
lowed workflow for housing loan approval is The Role Graph for the Housing Loans Depart-
shown in Figure 7. ment is depicted in Figure 9 (the numbers next
to each role are the tasks of the workflows of
Please note that in the original workflow, route Figures 7 and 8 the role is allowed to execute,
nodes need to exist after work nodes #1, #3, #4 they are the privileges for the role).
and #5, to allow for the possibility of the cus-
tomer’s application being found unsuitable at One DSOD constraint in the Department is that
each of these nodes. For clarity, however, these the Clerk who has processed the customer’s ap-
have been elided from the diagram. plication, (i.e,. tasks #1, #2 and #3) cannot
approve the documents or perform house as-
Please also note that the task #5 has been intro- sessment for the same customer (i.e., tasks #3a,
duced since, as per regulations at most Indian #4 or #5). This constraint restricts the choice
banks, a portion of the house must already have of who will perform tasks #3a, #4 and #5 in
been constructed before a housing loan can be the event of a workflow adaptation if no Junior
granted. This is to ensure that the loan amount Manager or Department Manager is available.
Department
Manager
4.3. Modification Regions for Workflow Loops — all tasks belonging to the same
Changes loop as the task being added or deleted, also
need to be considered as candidates for inclu-
A typical workflow change is a combination of sion in the MR.
two basic actions: Hence, in our example, the tasks #4, #5, #6 and
Task deletion #7 form the MR, since they follow the added
task #3a. Since tasks #1, #2 and #3 are already
Task addition completed, they are in DONE state. Hence they
When a task is deleted, if the tasks following do not belong to the MR.
this task are not changed in any way, then there
is no impact on the rest of the workflow. How- 4.4. Re-assigning Roles and Users to a
ever, if the succeeding tasks in the workflow Task
are “brought forward” in order to take advan-
tage of the task deletion, then all these tasks are We assume the existence of the following:
potentially affected by this workflow change.
Role Graph as described in Section 3.1
Tasks can be added in one of the following two
ways: User-Role mapping, which maps users to
the roles they perform on the Role Graph (ac-
In parallel — this would mostly affect other cording to the algorithm of Section 3.2)
tasks only if the user who is supposed to work
on this new task is also needed for other tasks As per the previous sub-section, when a task is
in the rest of the workflow. either added or deleted, all tasks in the MR have
to be rescheduled. Hence for each task in the
Sequentially — all succeeding tasks are po- MR, we need to do the following:
tentially affected by this new task.
Determine whether there are users possess-
In any case, determining the tasks affected by ing the roles assigned to the task (by invoking
the workflow change, which we call Modifica- the algorithm of Section 3.2), who are available
tion Region (MR), is a heuristic procedure that to execute the task. If so, the user is allocated
needs to be implemented by the user based on to the task.
the semantics of the workflow. Moreover, as al- If not, we adopt the following approach:
ready mentioned in Section 3.1, we have already
assumed that the Workflow Administrator has Let the role assigned to the task (as per the
the ability to understand the workflow seman- Role Graph) be R. We first search among the
tics so that he/she can identify the Modification seniors of R, in increasing order of senior-
Region for each workflow adaptation. ity in the Role Graph, as to whether any of
them are available to execute this task (via
The MR is therefore the only part of the work- inherited privileges). The search stops once
flow that needs to be rescheduled due to work- a senior is found who is available to execute
flow adaptation. In order to determine the MR, the task.
the Workflow Administrator can take advantage
of the following features of our workflow model If not, then we check among the juniors of
(see Section 2.1):
each of the already checked seniors of the
user in question. This continues recur-
Sync edges — tasks that are connected (even sively upwards in the Role Graph, starting
transitively) by (soft or strict) sync edges to the at each of the seniors of the user in ques-
task being added or deleted, need to belong to tion, until the MaxRole role is reached.
the MR. Hence all other workflow tasks that Of course, at any time, the search ends if
are successors of the sync edge-connected task, an available user is found.
also need to be evaluated as potential candidates
to be included in the MR. If not, we search among the juniors of R, in
decreasing order of seniority in the Role Graph.
State Transitions — all tasks that do not This is basically a “mirror image” of the search
belong to either DONE or FAILED state are among the seniors, thus: at each junior, the se-
potential candidates to be included in the MR. niors of the junior are also checked, and this also
Design of an Integrated Role-Based Access Control 305
proceeds recursively down the Role Graph, until mental to the security of an organization. How-
the MinRole role is reached. Again, the search ever, temporary delegation of a task to a junior
stops once a junior is found who is available to employee due to the absence of a senior em-
execute the task. ployee is a common practice in most organiza-
tions.
In case the role of the available user cannot
execute the task (as per the current Role-Task The algorithm will then have to be implemented
assignments), then the user needs to be tem- for the other tasks in the MR, viz., #4, #5, #6
porarily allocated the privilege, so that he/she and #7.
can execute the task. If this allocation becomes
The overall algorithm is given in Fig. 10.
permanent, then the workflow change will be a
schema-level change.
Please note that at each candidate role in both 5. Conclusions and Future Work
senior and junior searches, we also need to en-
sure that the Global SSOD & DSOD Constraints
In this paper, we have presented our approach to
are obeyed. Otherwise, we move on to the next
enforcing Role-Based Access Control (RBAC)
role and alert the workflow administrator as to
in Adaptive Workflow. In line with our earlier
the exact violations that would occur.
work on a 3-tier adaptive workflow architec-
If neither search produces a satisfactory re- ture, we have presented a 3-tier RBAC infras-
sult, the workflow administrator will have to tructure for adaptive workflow, consisting of
take a decision manually. Alternatively, he/she Global Constraints, User-Role Assignments and
can relax/remove some of the Global SSOD Role-Task Assignment Layers; this mirrors our
& DSOD Constraints so that some user can be adaptive workflow architecture, which consists
found to execute the task. of Planning, Schema and Instance layers, re-
spectively. We have shown that temporary User
In our example, the task #3a is added, while
and Role allocation changes are sufficient for
tasks #4 and #5 are parallelized, along with a
instance level changes. Schema level changes
strict-sync edge between them. In case a Junior
demand that these allocation changes be made
Manager is not available to execute task #3a,
permanent, so that all future workflow instances
then the above algorithm needs to be invoked in
deriving from the new workflow schema are af-
order to find out whether any other Junior Man-
fected by the newly changed allocations. In ad-
ager or the Department Manager is available for
dition, Planning level changes require changes
this task.
in the Global Constraints that define how the
If not, then any available Clerk needs to be tem- business operates itself.
porarily given the privilege of executing task
We have also presented an incremental algo-
#3a. In this case, if the clerk in question hap-
rithm, leveraging off prior research in Role
pens to be the one who processed the customer’s
Based Access Control and Secure Workflow.
application, then the DSOD constraint operat-
With this algorithm, it is possible to imple-
ing on this Clerk has to be removed to allow the
ment re-allocations in the presence of workflow
Clerk to execute this task.
changes. The re-allocations need to be imple-
In case of a workflow schema change, this tem- mented only for those portions of the workflow
porary privilege addition will become perma- (also known as Modification Regions) affected
nent. In other words, even Clerks will have the by the workflow change. Indeed, we believe
ability to perform initial approval, documents that this is the first attempt at defining an RBAC
examination and house assessment for all fu- model and infrastructure for adaptive workflow.
ture workflow instances and, in essence, they
There are several opportunities for future work.
will become the equals in rank to Junior Man-
Firstly, our RBAC model needs to be specified
ager. If, in addition, the constraint removal is
in more detail, so that it can be implemented and
also made permanent, then this will become a
experimentally tested. In particular, safety and
planning level change.
correctness algorithms (Mathews, 2001) need
At first glance, such a re-assignment may seem to be incorporated into the model. Moreover,
to be rather unusual and may even appear detri- a formal definition of our workflow language
306 Design of an Integrated Role-Based Access Control
BEGIN
Assume an initial allocation of users and roles to tasks in the workflow as per the algorithm
of Section 3.2. Also assume that a workflow change has been introduced.
Determine MR = fAffected Tasksg as in Section 4.3;
for each Task in MR do
f
MR MRn fTaskg;/ The Task is removed from the set of Affected Tasks =
IF the Task CAN be executed by the currently allocated user
then
f
return; / i.e., go to the next affected task in the MR /
g
IF NOT
then
f
S: Implement Re-Assignment Algorithm from Section 4.4;
if the Re-Assignment Algorithm is successful
then
f
Assign the user and the role to the task as per the Re-Assignment Algorithm;
return; / i.e., go to the next affected task in the MR /
g
if NOT, then
f
Alert the Workflow Administrator, so that the Workflow Administrator can
modify the SSOD & DSOD constraints in order to re-execute this algorithm;
go to statement S;
g
g
g while (there is another Task in the MR)
END
and execution model, along with formal work- gorithms specialized for specific workflow pat-
flow goal specification will also be necessary terns.
for implementation purposes. Formal specifica-
Our technique can also be extended for work-
tion of the SSOD and DSOD constraints, along flows running in distributed and heterogene-
lines of (Bertino, et.al., 1999), also need to be ous environments (Dellarocas and Klein, 1999;
incorporated into implementation. We should Herzberg, et.al., 2001; Kang, et.al., 2001; Na-
also incorporate more control-flow dependen- rendra, 2001), managed by intelligent agents.
cies (such as strict-sync and soft-sync) into our Also, the European bank case study as reported
workflow model, perhaps leveraging from the in (Schaad, et.al., 2001), has brought one possi-
ACTA (Chrysanthis and Ramamritham, 1990) ble interesting extension to the basic RBAC
transaction model. A (semi-) automatic algo- model used in this paper, viz., defining groups
rithm for MR determination can also be devel- of users for which roles can be assigned. The
oped and implemented. Using ideas from (van use of a general mechanism such as policy do-
der Aalst, et.al., 2001), we can also look at mains (Sloman and Twidle, 1994) needs inves-
efficient and automatic MR determination al- tigation. Other extensions of the RBAC model,
Design of an Integrated Role-Based Access Control 307
such as Team-Based Access Control (Geor- 8] CHRYSANTHIS P. K., AND RAMAMRITHAM K.,
giadis, et.al., 2001) and Set-Based Access Con- “ACTA: A Framework for Specifying and Rea-
soning about Transaction Structure and Behavior”,
trol (van den Akker, et.al., 2001), also need
to be investigated: In particular, the applicabil-
in Proceedings of the ACM SIGMOD International
Conference on Management of Data, pp. 194–203,
ity of TRBAC (Bertino and Bonatti, 2001) for 1990.
Adaptive Workflow needs to be investigated.
9] DAMIANOU N., DULAY N., LUPU E., SLOMAN
M., “The Ponder Specification Language”,
Workshop on Policies for Distributed Systems
6. Acknowledgments and Networks (Policy2001), HP Labs Bris-
tol, 29–31 Jan 2001; also available from
http://www.doc.ic.ac.uk/ mss/Papers/
The author wishes to thank his manager, Srinidhi Ponder-Policy01V5.pdf
Srinath and the SES Director, Padma Ravichan-
ger, for their support. 10 ] DELLAROCAS C., AND KLEIN M., “Civil Agent
Societies: Tools for inventing open agent-
mediated electronic marketplaces”, Proceedings
of the Workshop in Agent-Mediated Electronic
References Commerce (co-located with IJCAI’99), Stock-
holm, Sweden, July 1999; also available from
http://ccs.mit.edu/dell/
civilagentsocieties.pdf
1 ] VAN DER AALST W.M.P., HOFSTEDE A.H.M., KIE-
PUSZEWSKI B., AND BARROS A.P., “Workflow
Patterns”,2001, available from http:// 11 ] GEORGIADIS C. K., MAVRIDIS I., PANGALOS G., AND
tmitwww.tm.tue.nl/staff/wvdaalst/ THOMAS R. K., “Flexible Team-Based Access Con-
Publications/p108.pdf trol Using Contexts”, ACM Workshop on Role
Based Access Control, Proceedings of the Sixth
2 ] VAN DEN AKKER T., SNELL Q. O., AND CLEMENT M. ACM Symposium on Access Control Models and
J., “The YGuard Access Control Model: Set-Based Technologies, Chantilly, Virginia, USA, pp. 21–27,
Access Control”, ACM Workshop on Role Based 2001, ISBN:1-58113-350-2
Access Control, Proceedings of the Sixth ACM
Symposium on Access Control Models and Tech- 12 ] HERZBERG A., MASS Y., MIHAELI J., NAOR
nologies, Chantilly, Virginia, USA, Pages 75–84, D., AND RAVID Y., “Access Control Meets
2001, ISBN:1-58113-350-2. Public Key Infrastructure, Or: Assigning
3] ATLURI V., “Security for Workflow Systems”, Roles to Strangers”, 2001, available from
Information Security Technical Report, Volume http://www.haifa.il.ibm.com/projects/
6, Number 2, 2001, Elsevier Science, 2002, software/e-Business/papers/
pp. 59–68; also available from http://cimic. Paper Trust.pdf
rutgers.edu/ atluri/workflow.pdf
13 ] HUANG W-K., AND ATLURI V., “SecureFlow: A
4] ATLURI V., HUANG W-K., AND BERTINO E., “A Secure Web-enabled Workflow Management Sys-
Semantic-Based Execution Model for Multilevel tem”, 4th ACM Workshop on Role-based Ac-
Secure Workflows”, Journal of Computer Security, cess Control, October, 1999; also available
Volume 8, Number 1, 2000, pp. 3–41; also available from http://cimic.rutgers.edu/ atluri/
from http://cimic.rutgers.edu/ atluri/ rbac99.ps
jcs00a.ps
5] BERTINO E., AND BONATTI P.A., “TRBAC: A Tem- 14 ] KANG M. H., FROSCHER J. N., EPPINGER B. J., AND
poral Role-Based Access Control Model”, ACM MOSKOVITZ I. S., “A Multilevel Secure Work-
Transactions on Information and System Security, flow Management System”, 1999, available from
Vol. 4, No. 3, August 2001, pp. 191–223. http://www.itd.nrl.navy.mil/ITD/5540/
publications/CHACS/1999/
6] BERTINO E., FERRARI E., AND ATLURI V., “An 1999kang-IFIP99.pdf
Approach for the Specification and Enforcement
of Authorization Constraints in Workflow Man- 15 ] KANG M. H., PARK J. S., AND FROSCHER J.
agement Systems”, ACM Transactions on Infor- N., “Access Control Mechanisms for Inter-
mation Systems Security, February 1999, Vol. Organizational Workflow”, 2001, available from
1, No. 1; also available from http://cimic. http://citeseer.nj.nec.com/438991.html
rutgers.edu/ atluri/tissec.ps
7] CHOLEWKA D. G., BOTHA R. A., AND ELOFF J. H. 16 ] MATTHEWS M. G., “Supporting Adaptive Change
P., “A Context-Sensitive Access Control Model in B2B Coordination”, Proceedings of the
and Prototype Implementation”, Proceedings of International Conference on Artificial In-
IFIP/SEC 2000, August 2000; also available from telligence, Las Vegas, Nevada; 2001,
http://www.petech.ac.za/secwflow/images also available from http://mason.gmu.edu/
/papers/SEC2000Cholewka.pdf mmatthe1/Matthews ICAI 2001.pdf
308 Design of an Integrated Role-Based Access Control