Separation of duties for access control enforcement in workflow environments

被引:74
作者
Botha, RA
Eloff, JHP
机构
[1] Port Elizabeth Technikon, Fac Comp Studies, ZA-6000 Port Elizabeth, South Africa
[2] Rand Afrikaans Univ, Dept Comp Sci, ZA-2006 Auckland Pk, South Africa
关键词
Cryptography - Information management - Security of data;
D O I
10.1147/sj.403.0666
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Separation of duty as a security principle, has as its primary objective the prevention of fraud and errors. This objective is achieved by disseminating the tasks and associated privileges for a specific business process among multiple users. This principle is demonstrated in the traditional example of separation of duty found in the requirement of two signatures on a check. Previous work on separation of duty requirements often explored implementations based on role-based access control (RBAC) principles. These implementations are concerned with constraining the associations between RBAC components, namely users, roles, and permissions. Enforcement of the separation of duty requirements, although an integrity requirement, thus relies on an access control service that is sensitive to the separation of duty requirements. A distinction between separation of duty requirements that can be enforced in administrative environments, namely static separation of duty, and requirements that can only be enforced in a run-time environment, namely dynamic separation of duty, is required It is argued that RBAC does not support the complex work processes often associated with separation of duty requirements, particularly with dynamic separation of duty. The workflow environment, being primarily concerned with the facilitation of complex work processes, provides a context in which the specification of separation of duty requirements can be studied This paper presents the "conflicting entities" administration paradigm for the specification of static and dynamic separation of duty requirements in the workflow environment.
引用
收藏
页码:666 / 682
页数:17
相关论文
共 30 条
[1]   The RSL99 language for role-based separation of duty constraints [J].
Ahn, GJ ;
Sandhu, R .
FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, :43-54
[2]  
AHN GJ, 2000, P 5 ACM WORKSH ROL B
[3]   Turning points in interaction with computers [J].
Allen, FE .
IBM SYSTEMS JOURNAL, 1999, 38 (2-3) :135-138
[4]  
[Anonymous], LECT NOTES COMPUTER
[5]  
[Anonymous], 1999, ACM T INFORM SYST SE
[6]  
[Anonymous], 1997, P 2 ACM WORKSH ROL B
[7]  
BARKELY J, 2000, Patent No. 6088679
[8]  
Bertino E., 1999, ACM Trans. Inf. Syst. Secur., V2, P65, DOI 10.1145/300830.300837
[9]  
CHOLEWKA DG, 2000, P IFIP TC11 15 INT C, P341
[10]  
Clark D. D., 1987, Proceedings of the 1987 IEEE Symposium on Security and Privacy (Cat. No.87CH2416-6), P184