Cerberus: Automated synthesis of enforcement mechanisms for security-sensitive business processes

4Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Cerberus is a tool to automatically synthesize run-time enforcement mechanisms for security-sensitive Business Processes (BPs). The tool is capable of guaranteeing that the execution constraints EC on the tasks together with the authorization policy AP and the authorization constraints AC are satisfied while ensuring that the process can successfully terminate. Cerberus can be easily integrated in many workflow management systems, it is transparent to process designers, and does not require any knowledge beyond usual BP modeling. The tool works in two phases. At design-time, the enforcement mechanism M, parametric in the authorization policy AP, is generated from EC and AC; M can thus be used with any instance of the same BP provided that EC and AC are left unchanged. At run-time, a specific authorization policy is added to M, thereby obtaining an enforcement mechanism M ∗ dedicated to a particular instance of the security-sensitive business process. To validate our approach, we discuss the implementation and usage of Cerberus in the SAP HANA Operational Intelligence platform.

Cite

CITATION STYLE

APA

Compagna, L., dos Santos, D. R., Ponta, S. E., & Ranise, S. (2016). Cerberus: Automated synthesis of enforcement mechanisms for security-sensitive business processes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9636, pp. 567–572). Springer Verlag. https://doi.org/10.1007/978-3-662-49674-9_36

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free