高级检索
    刘道斌 郭 莉 白 硕. 一种工作流安全策略分析方法[J]. 计算机研究与发展, 2008, 45(6).
    引用本文: 刘道斌 郭 莉 白 硕. 一种工作流安全策略分析方法[J]. 计算机研究与发展, 2008, 45(6).
    Liu Daobin, Guo Li, and Bai Shuo. A Methodology for Analyzing Security Policy in Workflow[J]. Journal of Computer Research and Development, 2008, 45(6).
    Citation: Liu Daobin, Guo Li, and Bai Shuo. A Methodology for Analyzing Security Policy in Workflow[J]. Journal of Computer Research and Development, 2008, 45(6).

    一种工作流安全策略分析方法

    A Methodology for Analyzing Security Policy in Workflow

    • 摘要: 工作流系统中经常会发生来自系统内部人员的欺骗活动,职责分离是一种有效地防止内部欺骗的安全机制.讨论了工作流执行时的安全策略问题,给出了工作流直观的Petri网模型描述,Petri网模型清晰地刻画了工作流系统中所包含的任务以及任务与角色的对应关系.采用Prolog语言描述了工作流执行时的动态职责分离安全规则,在此基础上,运用逻辑推理的方法分析职责分离安全规则,目的是找出所有满足安全规则的有效执行链.通过分析找出所有满足安全规则的有效执行链.

       

      Abstract: Many facts indicate most criminalities correlated computer are executed by insiders in an organization, fraudulence is one of the main menaces. The fraudulent activities are difficultly detected due to viciously executed by insiders. The fraudulent activities performed by insiders often take place in workflow systems. Separation of duties is an efficient mechanism to prevent fraud within organizations. Isolating the task and executive object physically and logically is a effective way to eliminate the fraudulent behavior. Discussed in this paper is the problem of security policy on the executions of workflows. Workflows are intuitively specified with Petri nets. Petri net is a formal description tool, especially adapt to describe discrete event dynamic system. Furthermore, Petri net, a graphical description tool, can describe dynamic actions in a system by the way of token moving. Specially, the tasks in workflow systems and the relationship between the tasks and the roles are distinctly specified with Petri nets. The security rules are formally represented in Prolog. Based on the formal specification, the security rules are analyzed using logical reasoning to find all valid execution chains of a workflow. Through analysis, all valid execution chains are found, which satisfy the security rules.

       

    /

    返回文章
    返回