2012
DOI: 10.1007/978-3-642-28115-0_41
|View full text |Cite
|
Sign up to set email alerts
|

Conformance Checking of RBAC Policies in Process-Aware Information Systems

Abstract: Abstract. A process-aware information system (PAIS) is a software system that supports the definition, execution, and analysis of business processes. The execution of process instances is typically recorded in so called event logs. In this paper, we present an approach to automatically generate LTL (Linear Temporal Logic) statements from process-related RBAC (Role-based Access Control) models. These LTL statements are used to check if process executions that are recorded via event logs conform to the access co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…1) In the Conformance checking category, the three main development areas can be identified: different approaches to conformance checking, proposing new frameworks and algorithms and visualization. An approach to check if the data recorded in the event logs of a process aware information systems (PAIS) conforms to the corresponding process-related Role-based access control (RBAC) model is presented [20]. The process-related RBAC models are automatically transformed to corresponding Linear Temporal Logic (LTL) rules which are used to check the event logs for violations of the policies that are defined via the RBAC model [20].…”
Section: Research Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…1) In the Conformance checking category, the three main development areas can be identified: different approaches to conformance checking, proposing new frameworks and algorithms and visualization. An approach to check if the data recorded in the event logs of a process aware information systems (PAIS) conforms to the corresponding process-related Role-based access control (RBAC) model is presented [20]. The process-related RBAC models are automatically transformed to corresponding Linear Temporal Logic (LTL) rules which are used to check the event logs for violations of the policies that are defined via the RBAC model [20].…”
Section: Research Resultsmentioning
confidence: 99%
“…An approach to check if the data recorded in the event logs of a process aware information systems (PAIS) conforms to the corresponding process-related Role-based access control (RBAC) model is presented [20]. The process-related RBAC models are automatically transformed to corresponding Linear Temporal Logic (LTL) rules which are used to check the event logs for violations of the policies that are defined via the RBAC model [20]. The results of this conformance check can serve as basis for security and domain experts to detect violations [20].…”
Section: Research Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…A possible strategy for certain application scenarios would be to define break-the-glass (BTG) rules (see, e.g., [48] , [49] , [50] ) which allow to temporarily access the protected resources with fallback security settings, in order to provide for continuous operation. An outage of the Logging service is less severe, because it is strictly only required to perform a posteriori conformance checks of global constraints that may affect all (or at least multiple) process instances (see, e.g., [51] ). Instance-specific constraints are local to a certain process instance and can be enforced by means of instance-specific log data stored in WS-BPEL variables (see Section 5 ).…”
Section: Evaluation and Discussionmentioning
confidence: 99%
“…The result is a distinction of process log entries into correct and incorrect entries. For example, in [1] we present an approach to auto- matically generate LTL statements from process-related RBAC (Role-based Access Control) models. These LTL statements are used to check if process executions that are recorded via event logs conform to the access control policies defined via a corresponding RBAC model.…”
Section: Checking Of Security Properties Form Event Logsmentioning
confidence: 99%