TY - GEN
T1 - Verification of dynamic Separation of Duty policy for role-based business processes
AU - Thipse, Aashay
AU - Hewett, Rattikorn
PY - 2008
Y1 - 2008
N2 - Separation of Duty (SoD) is a widely used security principle to help prevent frauds in a business process. Though SoD has been studied by many researchers, most of them are concerned with specifications of various types of SoD constraints for policy enforcement. For large organizations that employ SoD policies, the ability to automatically verify if a given user-role assignment complies with SoD policies is of the great value for security management. This paper proposes an algorithm for constraint checking of simple dynamic SoD. Unlike most previous work that enforces SoD policy at run time (when roles are activated), our approach examines policy enforcement build-time (prior to run rime, i.e. when roles are assigned to users but not activated).
AB - Separation of Duty (SoD) is a widely used security principle to help prevent frauds in a business process. Though SoD has been studied by many researchers, most of them are concerned with specifications of various types of SoD constraints for policy enforcement. For large organizations that employ SoD policies, the ability to automatically verify if a given user-role assignment complies with SoD policies is of the great value for security management. This paper proposes an algorithm for constraint checking of simple dynamic SoD. Unlike most previous work that enforces SoD policy at run time (when roles are activated), our approach examines policy enforcement build-time (prior to run rime, i.e. when roles are assigned to users but not activated).
UR - http://www.scopus.com/inward/record.url?scp=51849134557&partnerID=8YFLogxK
U2 - 10.1109/TPSD.2008.4562752
DO - 10.1109/TPSD.2008.4562752
M3 - Conference contribution
AN - SCOPUS:51849134557
SN - 9781424420773
T3 - 2008 IEEE Region 5 Conference
BT - 2008 IEEE Region 5 Conference
T2 - 2008 IEEE Region 5 Conference
Y2 - 17 April 2008 through 20 April 2008
ER -