Implementing the Chinese wall security model in workflow management systems

Yu Cheng Hsiao, Gwan Hwan Hwang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

The Chinese wall security model (CWSM) was designed to provide access controls that mitigate conflict of interest in commercial organizations, and is especially important for large-scale interenterprise workflow applications. This paper describes how to implement the CWSM in a WfMS. We first demonstrate situations in which the role-based access control model is not sufficient for this, and we then propose a security policy language to solve this problem, also providing support for the intrinsic dynamic access control mechanism defined in the CWSM (i.e., the dynamic binding of subjects and elements in the company data set). This language can also specify several requirements of the dynamic security policy that arise when applying the CWSM in WfMSs. Finally we discuss how to implement a run-time system to implement CWSM policies specified by this language in a WfMS.

Original languageEnglish
Title of host publicationProceedings - International Symposium on Parallel and Distributed Processing with Applications, ISPA 2010
Pages574-581
Number of pages8
DOIs
Publication statusPublished - 2010 Dec 1
EventInternational Symposium on Parallel and Distributed Processing with Applications, ISPA 2010 - Taipei, Taiwan
Duration: 2010 Sep 62010 Sep 9

Publication series

NameProceedings - International Symposium on Parallel and Distributed Processing with Applications, ISPA 2010

Other

OtherInternational Symposium on Parallel and Distributed Processing with Applications, ISPA 2010
CountryTaiwan
CityTaipei
Period10/9/610/9/9

Keywords

  • Chinese wall security model (CWSM)
  • Role-based access control (RBAC)
  • Workflow management system (WfMS)

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computer Science Applications

Fingerprint Dive into the research topics of 'Implementing the Chinese wall security model in workflow management systems'. Together they form a unique fingerprint.

  • Cite this

    Hsiao, Y. C., & Hwang, G. H. (2010). Implementing the Chinese wall security model in workflow management systems. In Proceedings - International Symposium on Parallel and Distributed Processing with Applications, ISPA 2010 (pp. 574-581). [5634383] (Proceedings - International Symposium on Parallel and Distributed Processing with Applications, ISPA 2010). https://doi.org/10.1109/ISPA.2010.41