Salvato in:
Autore: | dos Santos, Daniel Ricardo |
---|---|
Titolo: | Automatic Techniques for the Synthesis and Assisted Deployment of Security Policies in Workflow-based Applications |
Pubblicazione: | : University of Trento, 2017-03-06 |
Abstract: |
Workflows specify a collection of tasks that must be executed under the responsibility or supervision of human users. Workflow management systems and workflow-driven applications need to enforce security policies in the form of access control, specif... of human users. Workflow management systems and workflow-driven applications need to enforce security policies in the form of access control, specifying which users can execute which tasks, and authorization constraints, such as Separation/Binding of Duty, further restricting the execution of tasks at run-time. Enforcing these policies is crucial to avoid frauds and malicious use, but it may lead to situations where a workflow instance cannot be completed without the violation of the policy. The Workflow Satisfiability Problem (WSP) asks whether there exists an assignment of users to tasks in a workflow such that every task is executed and the policy is not violated. The run-time version of this problem amounts to answering user requests to execute tasks positively if the policy is respected and the workflow instance is guaranteed to terminate. The WSP is inherently hard, but solutions to this problem have a practical application in reconciling business compliance (stating that workflow instances should follow the specified policies) and business continuity (stating that workflow instances should be deadlock-free). Related problems, such as finding execution scenarios that not only satisfy a workflow but also satisfy other properties (e.g., that a workflow instance is still satisfiable even in the absence of users), can be solved at deployment-time to help users design policies and reuse available workflow models. The main contributions of this thesis are three: 1. We present a technique to synthesize monitors capable of solving the run-time version of the WSP, i.e., capable of answering user requests to execute tasks in such a way that the policy is not violated and the workflow instance is guaranteed to terminate. The technique is extended to modular workflow specifications, using components and gluing assertions. This allows us to compose synthesized monitors, reuse workflow models, and synthesize monitors for large models. 2. We introduce and present techniques to solve a new class of problems called Scenario Finding Problems, i.e., finding execution scenarios that satisfy properties of interest to users. Solutions to these problems can assist customers during the deployment of reusable workflow models with custom authorization policies. 3. We implement the proposed techniques in two tools. Cerberus integrates monitor synthesis, scenario finding, and run-time enforcement into workflow management systems. Aegis recovers workflow models from web applications using process mining, synthesizes monitors, and invokes them at run-time by using a reverse proxy. An extensive experimental evaluation shows the practical applicability of the proposed approaches on realistic and synthetic (for scalability) problem instances. Read more |
Note: | In relazione con http://eprints-phd.biblio.unitn.it/1906/ application/pdf |
Autori secondari: | Ranise, Silvio Compagna, Luca Ponta, Serena |
Classe MIUR: | INF/01 - INFORMATICA |
Risorsa digitale: | Copia depositata in BNCF
Repository di Ateneo
Copia depositata in BNCF Repository di Ateneo |
LEADER | 04025nam a2200277 n 4500 | ||
---|---|---|---|
001 | TD17025669 | ||
005 | 20200923012345.0 | ||
049 | |a TDMAGDIG | ||
100 | |a 20190501d2017 --k--ita-50----ba | ||
200 | 1 | |a Automatic Techniques for the Synthesis and Assisted Deployment of Security Policies in Workflow-based Applications |b Tesi di dottorato | |
210 | 1 | |c University of Trento |d 2017-03-06 | |
300 | |a In relazione con http://eprints-phd.biblio.unitn.it/1906/ | ||
328 | 0 | |b tesi di dottorato |c INF/01 INFORMATICA |e University of Trento | |
330 | |a Workflows specify a collection of tasks that must be executed under the responsibility or supervision of human users. Workflow management systems and workflow-driven applications need to enforce security policies in the form of access control, specifying which users can execute which tasks, and authorization constraints, such as Separation/Binding of Duty, further restricting the execution of tasks at run-time. Enforcing these policies is crucial to avoid frauds and malicious use, but it may lead to situations where a workflow instance cannot be completed without the violation of the policy. The Workflow Satisfiability Problem (WSP) asks whether there exists an assignment of users to tasks in a workflow such that every task is executed and the policy is not violated. The run-time version of this problem amounts to answering user requests to execute tasks positively if the policy is respected and the workflow instance is guaranteed to terminate. The WSP is inherently hard, but solutions to this problem have a practical application in reconciling business compliance (stating that workflow instances should follow the specified policies) and business continuity (stating that workflow instances should be deadlock-free). Related problems, such as finding execution scenarios that not only satisfy a workflow but also satisfy other properties (e.g., that a workflow instance is still satisfiable even in the absence of users), can be solved at deployment-time to help users design policies and reuse available workflow models. The main contributions of this thesis are three: 1. We present a technique to synthesize monitors capable of solving the run-time version of the WSP, i.e., capable of answering user requests to execute tasks in such a way that the policy is not violated and the workflow instance is guaranteed to terminate. The technique is extended to modular workflow specifications, using components and gluing assertions. This allows us to compose synthesized monitors, reuse workflow models, and synthesize monitors for large models. 2. We introduce and present techniques to solve a new class of problems called Scenario Finding Problems, i.e., finding execution scenarios that satisfy properties of interest to users. Solutions to these problems can assist customers during the deployment of reusable workflow models with custom authorization policies. 3. We implement the proposed techniques in two tools. Cerberus integrates monitor synthesis, scenario finding, and run-time enforcement into workflow management systems. Aegis recovers workflow models from web applications using process mining, synthesizes monitors, and invokes them at run-time by using a reverse proxy. An extensive experimental evaluation shows the practical applicability of the proposed approaches on realistic and synthetic (for scalability) problem instances. | ||
336 | |a application/pdf |a application/pdf | ||
689 | 0 | |a INF/01 |b INFORMATICA |c TDR | |
700 | 0 | |a dos Santos, Daniel Ricardo | |
702 | 0 | |a Ranise, Silvio | |
702 | 0 | |a Compagna, Luca | |
702 | 0 | |a Ponta, Serena | |
801 | 3 | |a IT |b IT-FI0098 | |
856 | 4 | |u http://memoria.depositolegale.it/*/http://eprints-phd.biblio.unitn.it/1906/1/thesis.pdf |2 http://eprints-phd.biblio.unitn.it/1906/1/thesis.pdf | |
856 | 4 | |u http://memoria.depositolegale.it/*/http://eprints-phd.biblio.unitn.it/1906/2/disclaimer.pdf |2 http://eprints-phd.biblio.unitn.it/1906/2/disclaimer.pdf | |
977 | |a CR | ||
FMT | |a TD | ||
FOR | |a TD |
Tesi di dottorato
| Lingua:
| Paese:
| BID: TD17025669
Biblioteca | Inventario | Volume | Collocazione | Fruizione | status |
---|
Documenti simili
Automatic Deployment of Applications in the Cloud Lascu, Tudor Alexandru |
Service infrastructure : deployment and security. Manno, Ilaria |
Analysing and deploying microservice-based applications NERI, DAVIDE |
Methods and Techniques for Dynamic Deployability of Software-Defined Security Services Doriguzzi Corin, Roberto |
Automatic algorithms for the deployment of mobile sensors. Silvestri, Simone |
A framework for automatic security checking of mobile applications. Verderame, Luca |
Ensemble learning techniques for cyber security applications Pisani, Francesco Sergio |
Ensemble learning techniques for cyber security applications. Pisani, Francesco Sergio |
Computational intelligence-based techniques for cyber security. Leoncini, Alessio |
HARDWARE-ASSISTED VIRTUALIZATION AND ITS APPLICATIONS TO SYSTEMS SECURITY |