Chinese wall security model for workflow management systems with dynamic security policy

Yu Cheng Hsiao, Gwan Hwan Hwang*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

4 Citations (Scopus)

Abstract

Secure workflow management systems (WfMSs) are required to support major security features such as authentication, confidentiality, data integrity, and nonrepudiation. The Chinese wall security model (CWSM) was designed to provide access controls that mitigate conflict of interest in commercial organizations, and is especially important for large-scale interenterprise workflow applications. This paper describes how to implement the CWSM in a WfMS. We first demonstrate situations in which an access control model is not sufficient for this if the WfMS does not keep the run-time history of data accesses and company information is mutable, and we then propose an application programming interface (API) to solve this problem, also providing support for the intrinsic dynamic access control mechanism defined in the CWSM (i.e., the dynamic binding of subjects and elements in the company data set). This API can also specify several requirements of the dynamic security policy that arise when applying the CWSM in WfMSs. Finally we discuss how to implement a run-time system to implement CWSM policies specified by this API in a WfMS.

Original languageEnglish
Pages (from-to)417-440
Number of pages24
JournalJournal of Information Science and Engineering
Volume29
Issue number3
Publication statusPublished - 2013 May

Keywords

  • Chinese wall security model (CWSM)
  • Computer-supported cooperative work (CSCW)
  • Role-based access control (RBAC)
  • Security
  • Workflow management system (WfMS)

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Hardware and Architecture
  • Library and Information Sciences
  • Computational Theory and Mathematics

Fingerprint

Dive into the research topics of 'Chinese wall security model for workflow management systems with dynamic security policy'. Together they form a unique fingerprint.

Cite this