The algorithm creates a temporary virtual activity,
tmpva
j
for each pair of duty-conflict tasks a
x
and a
y
in
va
i
, where tmpva
j
= { a
x
, a
y
}. Then role r’s permis-
sions on tmpva
j
are derived according to Table 2
(under LPP)
by using the maximum privilege of P(r, a
x
)
and P(
r, a
y
) (i.e.
r
a
x
Pmax
and
r
a
y
Pmax
), respectively.
Once role
r’s permissions on duty-conflict tasks are
derived, the algorithm then uses Equation (1) de-
scribed in Section 3.3 to derive role
r’s permissions
on the virtual activity
va
i
.
4 CONCLUSIONS AND FUTURE
WORKS
Authorization management and access control are
essential in supporting secure workflow management
systems. Process-view is a good solution that differ-
ent workflow participants acquire different needs and
types of authority. This work analyzes the grouping
and aggregate function of a virtual activity; and fur-
ther, explains the permissions of a virtual activity in a
process-view. Moreover, this work discusses the
permissions for a role on a virtual activity aggregated
from duty-conflict base activities.
Our future work will address two themes. First,
duty-conflict relationships are essential to design SoD
constraints. Further work is necessary to explore
more kinds of duty-conflict relationships. Second,
inter-organization workflows are gaining importance
in B-to-B commerce. Although some works have
addressed access control in this aspect, they disregard
the coordination behavior in inter-organizational
workflows (
Schulz and Orlowska, 2004). Future re-
search will be to investigate the authorizations and
access control in inter-organizational workflows.
ACKNOWLEDGEMENTS
The authors would like to thank the National Science
Council of the Republic of China for financially
supporting this research under contract no. NSC
94-2416-H-216 -004.
REFERENCES
Ahn, G-J, Sandhu, R., Kang, M., Park, J.(2002). Injecting
RBAC to Secure a Web-based Workflow System, In
Proceedings of 5th ACM Workshop on Role-Based Ac-
cess Control.
Atluri, V., Huang W-K (1996). An Authorization Model for
Workflows, Proceedings of the fifth European Sympo-
sium on Research in Computer Security, Rome, Italy,
44 – 64.
Bertino, E., Ferrari, E., Atluri, V. (1999). Specification and
Enforcement of Authorization Constraints in Workflow
Management Systems, ACM Transactions on Informa-
tion and System Security, Vol. 2, No. 1, 65 – 104.
Ferraiolo, D.F., Cugini, J., Kuhn, R. (1995). Role-Based
Access Control (RBAC): Features and Motivations,
Proceedings of 11th Annual Computer Security Appli-
cation Conference, IEEE Computer Society Press,
241-248.
Ferraiolo, D.F., Kuhn, R. (1992). Role-Based Access Con-
trol, In Proceedings of 15th NIST-NCSC National
Computer Security Conference, 554-563.
Georgakopoulos, D., Hornick, M., Sheth, A. (1995). An
Overview of Workflow Management: From Process
Modeling to Workflow Automation Infrastructure, Dis-
tributed and Parallel Databases, 119-153
Gligor, V.D., Gavrila, S.I., Ferraiolo, D. (1998). On the
Formal Definition of Separation-of-Duty Policies and
Their Composition, Proceedings of IEEE Symposium on
Security and Privacy, IEEE Computer Society.
Huang, W-K, Atluri, V. (1999). SecureFlow: A secure
web-based workflow management system, In Proceed-
ings of 4th ACM Workshop on Role-Based Access Con-
trol, 83-94.
Nash, M.J., Poland, K.R. (1990). Some Conundrums Con-
cerning Separation of Duty, Proceedings of IEEE
Computer Society Symposium on Security and Privacy,
IEEE Computer Society Press.
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman C.E.
(1996). Role-Based Access Control Models, IEEE
Computer, 29(2), 38-47.
Schulz, K.A., Orlowska, M.E. (2004). Facilitating cross-
organizational workflows with a workflow view ap-
proach, Data & Knowledge Engineering, 51, p109-147.
Shen, M., Liu, D.R. (2004). Discovering role-relevant
process-views for disseminating process knowledge,
Expert Systems with Applications, 26, 301–310.
Simon, R.T., Zurko, M.E. (1997). Separation of Duty in
Role-Based Environments, 10
th
Computer Security
Foundations Workshop.
SECRYPT 2007 - International Conference on Security and Cryptography
90