Skip to main content

Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints: An Action-Based Approach

  • Conference paper
Trust, Privacy and Security in Digital Business (TrustBus 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5695))

Abstract

We present an approach to the formal specification and automatic analysis of business processes under authorization constraints based on the action language \(\cal{C}\). The use of \(\cal{C}\) allows for a natural and concise modeling of the business process and the associated security policy and for the automatic analysis of the resulting specification by using the Causal Calculator (CCALC). Our approach improves upon previous work by greatly simplifying the specification step while retaining the ability to perform a fully automatic analysis. To illustrate the effectiveness of the approach we describe its application to a version of a business process taken from the banking domain and use CCALC to determine resource allocation plans complying with the security policy.

This work was partially supported by the FP7-ICT-2007-1 Project no. 216471, “AVANTSSAR: Automated Validation of Trust and Security of Service-oriented Architectures” ( www.avantssar.eu ).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schaad, A., Lotz, V., Sohr, K.: A model-checking approach to analysing organisational controls in a loan origination process. In: SACMAT 2006, pp. 139–149. ACM, New York (2006)

    Google Scholar 

  2. Cerone, A., Xiangpeng, Z., Krishnan, P.: Modelling and resource allocation planning of BPEL workflows under security constraints. Technical Report 336, UNU-IIST (2006), http://www.iist.unu.edu/

  3. Giunchiglia, E., Lifschitz, V.: An action language based on causal explanation: Preliminary report. In: AAAI 1998, pp. 623–630. AAAI Press, Menlo Park (1998)

    Google Scholar 

  4. Texas Action Group at Austin: The causal calculator (2008), http://www.cs.utexas.edu/users/tag/cc/

  5. Peterson, J.L.: Petri Net Theory and the Modeling of Systems. Prentice Hall PTR, Upper Saddle River (1981)

    MATH  Google Scholar 

  6. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38–47 (1996)

    Article  Google Scholar 

  7. Chirichiello, A.: Two Formal Approaches for Web Services: Process Algebras & Action Languages. PhD thesis, “Sapienza” University of Roma (2008)

    Google Scholar 

  8. Koksal, P., Cicekli, N.K., Toroslu, I.H.: Specification of workflow processes using the action description language \(\mathcal{C}\). In: AAAI Spring 2001 Symposium Series: Answer Set Programming, pp. 103–109 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Armando, A., Giunchiglia, E., Ponta, S.E. (2009). Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints: An Action-Based Approach. In: Fischer-Hübner, S., Lambrinoudakis, C., Pernul, G. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2009. Lecture Notes in Computer Science, vol 5695. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03748-1_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03748-1_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03747-4

  • Online ISBN: 978-3-642-03748-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics