DW-RBAC : مدل امنیتی رسمی هیئت نمایندگی و ابطالی در سیستم های جریان کار
|کد مقاله||سال انتشار||مقاله انگلیسی||ترجمه فارسی||تعداد کلمات|
|21801||2007||20 صفحه PDF||سفارش دهید||محاسبه نشده|
Publisher : Elsevier - Science Direct (الزویر - ساینس دایرکت)
Journal : Information Systems, Volume 32, Issue 3, May 2007, Pages 365–384
One reason workflow systems have been criticized as being inflexible is that they lack support for delegation. This paper shows how delegation can be introduced in a workflow system by extending the role-based access control (RBAC) model. The current RBAC model is a security mechanism to implement access control in organizations by allowing users to be assigned to roles and privileges to be associated with the roles. Thus, users can perform tasks based on the privileges possessed by their own role or roles they inherit by virtue of their organizational position. However, there is no easy way to handle delegations within this model. This paper tries to treat the issues surrounding delegation in workflow systems in a comprehensive way. We show how delegations can be incorporated into the RBAC model in a simple and straightforward manner. The new extended model is called RBAC with delegation in a workflow context (DW-RBAC). It allows for delegations to be specified from a user to another user, and later revoked when the delegation is no longer required. The implications of such specifications and their subsequent revocations are examined. Several formal definitions for assertion, acceptance, execution and revocation are provided, and proofs are given for the important properties of our delegation framework.
Despite various advances in workflow technology, current workflow systems still do not handle delegation well. In its simplest form, a user who has been assigned a task and is unavailable to perform it for any reason (such as leave of absence, sickness, etc.) should be able to delegate it to another user. If such support is not provided, the task will not get done. The role-based access control model (RBAC) (for example ) is receiving attention as a systematic way of implementing the security policy of an organization. It groups individual users into roles that relate to their position within an organization and assigns permission to various roles according to their stature in the organization. Roles are generic terms like manager, vice-president, etc. and anybody in a role can perform certain tasks assigned to him or her. The term delegation is usually employed in the security literature to describe transfer or inheritance of rights from some user to a machine, that then acts as a surrogate for that user (as in an ATM transaction, for instance). Only recently researchers are starting to recognize the importance of introducing delegation into the RBAC framework. The two significant research efforts that we are aware of in this direction are those of Barka and Sandhu  and  and of Yao, Moody and Bacon . The work of Barka and Sandhu allows a role to delegate to another role, and also considers multi-step delegations and revocations. Yao et al.  introduces the notion of an appointment whereby a user can appoint another user to perform a task. RBAC features are increasingly being supported in commercial database systems such as Informix, Sybase and Oracle , and the term grant is used to refer to the assignment of privileges to users and role. Moreover, grant is itself a right that can be conferred. In this way, delegation can be implemented in a database system. However, such support is still limited and does not permit very fine-grained control in a dynamic environment. In RBAC, in addition to roles, users and privileges, there is also a notion of sessions. Thus, a user may log into different sessions with different roles that she is entitled to play. For example, in one session Mary may be logged in as a cashier and in another as an accounts manager. In workflow applications, the concept of a session is less clear. Instead workflow systems have a notion of cases, corresponding to the processing of a specific instance, such as Beth's expense reimbursement claim for travel to Chicago, or Carl's auto accident claim. In this context, privileges must be case-specific, i.e., a user may have permission to perform a task for a certain case but not be allowed to perform the same task for another case. For example, Beth must not be the requester and approver for the same reimbursement, but, of course, Beth may be the approver for Carol's request, and may herself be the requester of a different reimbursement process. Thus, Beth may be at the same time requesting her reimbursement and approving Carol's, but that is acceptable if these roles are being played in different reimbursement cases even within the same session. Previous work by the authors  extends RBAC to accommodate case-based privileges in the context of workflow systems. The present paper is an attempt to include delegation into such a framework. This work extends the ideas presented in , which discuss some of the ideas of a fine-grained delegation/revocation framework in RBAC. In this work those ideas have been extended into a workflow domain. This paper is organized as follows. Section 2 describes briefly the motivation behind the W-RBAC model, an extension to the RBAC model to deal with workflow systems. Section 3 describes the key intuitions behind our model of delegation. Then Section 4 discusses the formal aspect of the assertion of a delegation. Section 5 discusses the intuitive and formal aspects of revocation of delegations. Section 6 proposes extensions to our framework to allow richer kinds of delegations, and Section 7 describes a proof of concept implementation. Then, Section 8 discusses related work, while Section 9 gives the conclusions of this work.
نتیجه گیری انگلیسی
Researchers have recently noted ,  and  that the current RBAC model does not handle delegation well and has various shortcomings in this respect. In this paper, we extended our previous on WRBAC  to incorporate delegation in a workflow context in an RBAC environment. The DW-RBAC model allows a fine- grained delegation, in which rights to execute a task for a workflow case, and delegation rights are delegated among users in an ad hoc way, controlled by general, organization-level constraints. A novel aspect of our approach lies in providing two types of constraints: generic constraints for managing overall delegation policies, and dynamic constraints for implementing case-specific policies that pertain to a specific case. Case specific policies are important when binding or separation of duties has to be enforced. In addition, we discussed algorithms for revocation of delegations, and also described a proof of concept implementation done in Prolog to test our proposal. The paper also discussed our ideas for how the framework can easily be extended to incorporate other variants of delegations such as: transfers, strong delegations, and temporal delegations. Another extension that would be useful and deserves consideration is delegation to a group, such that the group (as opposed to an individual) is required to perform the delegated task. For example, a VP may delegate a task (say, approval of a loan request) to two of her department heads, with the provison that they must review it independently and unless both give their approval, the decision will be negative. The problems with delegation to a group is that it involves creating a subworkflow for the members of the group to execute the delegated task. Further work is required with regards to these extensions.