
performed by authorized subjects only. An appropriate authorization model for
workflows must provide the notion of just-in-time authorization. It enables the
granting, usage tracking and revoking of authorization to be automated and
coordinated with the progression of various tasks. Otherwise, a subject may process
authorization for time periods longer than required, which may compromise security.
The model has to prevent any unauthorized modification of data and to enforce the
legitimate pattern of operations in data accesses by the subject(s) for executing a task.
In this paper, we propose an authorization and access control model that is able to
specify authorization in such a way that subject gain access to required object during
the execution of the task. We build our models over the well-known role-based access
control (RBAC) framework. In our authorization model we try to inject RBAC into an
existing workflow system. We extend the RBAC model by adding some new rules
and definitions to meet our needs and to be able to deal with the workflow context. In
the rest of the paper, section 2 describes some related work, section 3 describes the
basic elements of the model, section 4 presents the global workflow authorization
model and finally section 5 discusses the conclusions and some perspectives.
2 Related work
Security is a critical and essential part of workflows, and it has become an important
topic in the research community as well as the industry especially authorization and
access control have been widely discussed and many methods have been proposed to
model the authorization and access control properties. Many researchers are working
on workflow standards. The Workflow Management Coalition (WfMC) is a non
profit organization that focuses on the advancement of workflow management
technology in industry. WfMC summarizes a number of security services [9] for a
conceptual workflow model that includes authentication, authorization, access
control, data privacy, audit…
For workflow security, previous research has been done mainly on several aspects,
which include task assignment constraints, inter-workflow security, and multilevel
secure workflow systems [7]. Using task assignment constraints, assignment methods
for the workflow systems are specified in terms of constraints on the permissible
assignments of users to tasks and roles. Because the role-based model is a natural
choice for implementing security in workflow systems, most of the discussions are
based on that.
Bertino, Ferrari, and Atluri [2] propose an interesting and powerful constraint
based security model also based on logic predicates, that allows for somewhat
different expressivity than the one presented here. Predicates in constraint expressions
include predicates over a role graph and predicates over history.
The Workflow Authorization Model (WAM) [1] presents a conceptual, logical and
execution model which concentrates on the enforcement of authorization flow in task
dependency and transaction processing by using Petri Nets (PN). The workflow
designer defines the static parameters of the authorization using an Authorization
Template (AT) during the build-time of the workflow. When the task starts execution,
the AT is used to derive the actual authorization. In a Multilevel Secure (MLS)
workflow environment, tasks are assigned to different security levels.
32