Title: A SMT-based methodology for monitoring of security-aware workflows

Authors: Clara Bertolissi; Silvio Ranise

Addresses: LIF-CNRS and University Aix-Marseille, Parc Scientifique et Technologique de Luminy, 163, avenue de Luminy, 13288 Marseille, France; Fondazione Bruno Kessler (FBK), Via Sommarive, 18, 38123 Povo TN, Italy ' Fondazione Bruno Kessler (FBK), Via Sommarive, 18, 38123 Povo TN, Italy

Abstract: Run-time monitors are crucial to the development of security-aware workflow management systems, which are at the heart of modern e-services and need to mediate access to their resources by imposing authorisation constraints (e.g., separation of duty). In this paper, we propose a new methodology to build run-time monitors capable of ensuring the successful termination of workflows subject to authorisation constraints. The methodology is based on state-of-the-art satisfiability modulo theories techniques.

Keywords: security policies; authorisation constraints; workflow management systems; automated verification; satisfiability modulo theories; SMT; run-time monitoring; security-aware workflows; e-services; electronic services; online services; workflow security.

DOI: 10.1504/IJITST.2014.065188

International Journal of Internet Technology and Secured Transactions, 2014 Vol.5 No.3, pp.275 - 290

Received: 01 Mar 2014
Accepted: 26 Jun 2014

Published online: 28 Oct 2014 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article