Consolidating the access control of composite applications and workflows

Martin Wimmer, Alfons Kemper, Maarten Rits, Volkmar Lotz

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for composite applications should be provided. Such a policy is based on the policies of the corresponding autonomous sub-applications and has the following properties: On the one hand, it needs to be as restrictive as possible to block requests which do not comply with the integrated sub-applications' policies. Thereby, unsuccessful executions of requests are prevented at an early stage. On the other hand, the composite policy must grant all necessary privileges in order to make the intended functionality available to legitimate users. In this paper, we present our formal model and respective algorithmic solutions for consolidating the access control of composite applications. The generated policies conform to the presented requirements of the least privileges paradigm and, thus, allow to revise and optimize the access control of composite applications. We demonstrate this by means of Web service workflows that constitute the state of the art for the realization of business processes.

Original languageEnglish
Title of host publicationData and Applications Security XX - 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Proceedings
EditorsPeng Liu, Ernesto Damiani
PublisherSpringer Verlag
Pages44-59
Number of pages16
ISBN (Electronic)9783540367963
ISBN (Print)3540367969, 9783540367963
DOIs
StatePublished - 2006
Event20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security - Sophia Antipolis, France
Duration: 31 Jul 20062 Aug 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4127 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security
Country/TerritoryFrance
CitySophia Antipolis
Period31/07/062/08/06

Fingerprint

Dive into the research topics of 'Consolidating the access control of composite applications and workflows'. Together they form a unique fingerprint.

Cite this