identify and systematize workflow authentication re-
quirements. We propose to meet these requirements
by supporting authorizations with authentication-
based constraints. With this purpose we define an
extension to the RBAC model and propose an algo-
rithm that enforces these authorizations. With our ap-
proach, users do not need to satisfy, in the initial au-
thentication process, all workflow authentication re-
quirements, since they are only evaluated when they
request access to activities. Moreover, when a user
does not possess all the required authentication infor-
mation, the access control decision function notifies
the WfMS, that can choose how to proceed.
We are implementing workflow authentication re-
quirements in a WfMS called WorkSCo (Workflow
with Separation of Concerns) (INESC Lisboa Soft-
ware Engineering Group, 2004). WorkSCo already
uses an RBAC model that needs to be extended in
order to provide evaluation and enforcement of au-
thentication constraints. As to communications be-
tween WorkSCo and exterior identity providers, we
intend to adopt a standard called Security Assertion
Markup Language (SAML)(OASIS, 2005). SAML
is an XML-based framework for communicating user
authentication, entitlement and attribute information.
SAML-enabled systems may exchange authentication
information on users, independently of their hetero-
geneous software and hardware environments. Mes-
sages exchanged must obey to SAML defined XML
schemas and protocols that will enable the WorkSCo
WfMS to query different identity providers and con-
sume produced SAML authentication assertions, in
order to produce and enforce authorization decisions
that include authentication constraints.
REFERENCES
Bertino, E., Ferrari, E., and Atluri, V. (1999). The Specifi-
cation and Enforcement of Authorization Constraints
in Workflow Management Systems. ACM Trans. Inf.
Syst. Secur., 2(1):65–104.
Beznosov, K. (1998). Requirements for access control: Us
healthcare domain. In RBAC ’98: Proceedings of the
third ACM workshop on Role-based access control,
page 43, New York, NY, USA. ACM Press.
Casati, F., Castano, S., and Fugini, M. (2001). Manag-
ing workflow authorization constraints through active
database technology. Information Systems Frontiers,
3(3):319–338.
Casati, F., Castano, S., and Fugini, M. G. (1998). Enforc-
ing workflow authorization constraints using triggers.
Journal of Computer Security, 6(4):257–285.
Ferraiolo, D. F., Sandhu, R. S., Gavrila, S. I., Kuhn, D. R.,
and Chandramouli, R. (2001). Proposed NIST Stan-
dard for Role-based Access Control. Information and
System Security, 4(3):224–274.
Hung, P. C. K. and Karlapalem, K. (2003). A secure
workflow model. In CRPITS ’03: Proceedings of
the Australasian information security workshop con-
ference on ACSW frontiers 2003, pages 33–41, Dar-
linghurst, Australia, Australia. Australian Computer
Society, Inc.
INESC Lisboa Software Engineering Group (2004).
WorkSCo: Workflow with Separation of Concerns.
http://sourceforge.net/projects/worksco/.
Kandala, S. and Sandhu, R. (2002). Secure Role-Based
Workflow Models. In DAS’01: Proceedings of the fif-
teenth Annual Working Conference on Database and
Application Security, pages 45–58, Niagara, Ontario,
Canada. Kluwer Academic Publishers.
Kent, S. T. and Millett, L. I., editors (2003). Who goes
There? Authentication Through the Lens of Privacy.
National Academies Press, Washington, DC, USA.
Moodahi, I., Gudes, E., Lavee, O., and Meisels, A. (2004).
A Secure Workflow Model Based on Distributed Con-
strained Role and Task Assignment for the Inter-
net. In ICICS’04: Proceedings of the sixth In-
ternational Conference on Information and Commu-
nications Security, pages 171–186, Malaga, Spain.
Springer-Verlag.
Muehlen, M. Z. (2004). Organizational Management in
Workflow Applications – Issues and Perspectives. Inf.
Tech. and Management, 5(3-4):271–291.
OASIS (2005). SAML V2.0 Executive Overview. Technical
report, Organization for Advancement of Structured
Information Standards.
Samarati, P. and di Vimercati, S. D. C. (2000). Access Con-
trol: Policies, Models, and Mechanisms. In FOSAD
’00: Revised versions of lectures given during the
IFIP WG 1.7 International School on Foundations of
Security Analysis and Design, pages 137–196, Berti-
noro, Italy. Springer-Verlag.
Tzelepi, S. and Pangalos, G. (2001). A flexible access con-
trol model for multimedia medical image security. In
PCM ’01: Proceedings of the Second IEEE Pacific
Rim Conference on Multimedia, pages 1030–1035,
Beijing, China. Springer-Verlag.
Wang, L., Wei, L., Liao, X., and Wang, H. (2004).
AT-RBAC: An Authentication Trustworthiness-Based
RBAC Model. In GCC Workshops, pages 343–350,
Wuhan, China. Springer-Verlag.
Workflow Management Coalition (1999). Terminology &
Glossary. Technical report, Workflow Management
Coalition.
SUPPORTING AUTHENTICATION REQUIREMENTS IN WORKFLOWS
187