DOI QR코드

DOI QR Code

Design on Security Protocols Reflecting Collaboration in Workflow Management Systems

협업 기반 워크플로우 관리시스템의 보안 프로토콜 설계

  • Published : 2008.10.31

Abstract

As the collaboration of WFMS(workflow management systems) in enterprises increases, security protocols could be considered a critical factor affecting secure operation of WMFS. The security protocol of WFMS could not reflect the nature of collaboration in WFMS, resulting to collaboration of WFMS on Internet causing the operation problems of WFMS. This study suggests collaboration based security protocols based on the collaboration of WFMS on Internet. To reflect the nature of collaboration in WFMS, this study analyzes security requirements for WFMS. Based on security requirements, this study suggests a security architecture and security protocols for WFMS using security agents.

워크플로우 관리시스템이 폭넓게 사용됨에 따라 조직간의 협업이 증가하고 있다. 워크플로우 시스템의 협업이 증가함에 따라 보안의 중요성이 강조되고 있다. 사용자 인증 워크플로우 시스템간의 안전한 통신 기능 등의 보안 기능은 인터넷상에서 워크플로우 관리시스템의 운영에 영향을 미치고 있지만, 워크플로우 시스템은 협업을 기반으로 보안 프로토콜이 제공되지 않은 실정이다. 따라서 본 논문은 워크플로우 관리시스템의 협업기반 보안 프로토콜을 제안한다. 협업 기반 보안 프로토콜의 제안을 위해서 본 논문은 워크플로우 관리시스템의 보안요구사항을 분석하고, 보안요구사항을 바탕으로 보안 아키텍쳐와 보안 프로토콜을 제시한다.

Keywords

References

  1. Mike Anderson, "Workflow Interoperability-Enabling E-Commerce", WfMC White Paper, 1999.
  2. Elisa Bertin, Elena Ferrari, "The Specification and Enforcement of Authorization Constraints in Workflow Management Systems," ACM Transactions on Information Systems and System Security, Vol. 2, No. 1, 1999, pp. 65-104. https://doi.org/10.1145/300830.300837
  3. Mary Ann Davidson, "Security for E-Business," Information Security Technical Report, Vol. 6, No. 2, 2001, pp. 80-94. https://doi.org/10.1016/S1363-4127(01)00209-6
  4. Ehud Gudes, Martin S. Oliver and Reind P. van de jet, "Modeling, Specifying and Implementing Workflow Security in Cyberspace," Journal of Computer Security, Vol. 7, No. 4, 1999.
  5. T.Leighton, S.Micali, "Secret-Key Agreement without Public-Key Cryptography," Proceedings of Crypto 94, 1994, pp.456-479.
  6. Le Yang, M.G.Choi, Y.S.Choi, S.M. Shin, "FWAM: A Flexible Workflow Authorization Model using Extended RBAC," Proceeding of Computer Supported Cooperative Work in Design, 2008.
  7. D. Liu, M. Wu and S. Lee, "Role-Based Authorizations for Workflow Systems in Support of Task-Based Separation of Duty," The Journal of Systems and Software, Vol. 73, 2004, pp. 375-387. https://doi.org/10.1016/S0164-1212(03)00175-4
  8. Myeonggil Choi, Urlong Jin, Y.S.Choi, and S.M. Shin, "Development of a Flexible Access Conrol Design by Extending RBAC," Proceedings of First International Conference on Communications and Networking in China, 2006.
  9. Patrick McDaniel, Peter Honeyman, "Antigone: Flexible Framework for Secure Group Communication", Proceedings of the 8th USENIX Security Symposium, 1999, pp. 99-114.
  10. S. Tinderle, M. Teichert and P. Dadam, “Correctness Criteria for Dynamic Changes in Workflow Systems,” Data & Knowledge Engineering, Vol. 50, 2004, pp. 9-34. https://doi.org/10.1016/j.datak.2004.01.002
  11. Workflow Management Coalition, "Workflow Reference Model", Technical Report, 1994.
  12. Workflow Management Coalition, "Workflow and Internet: Catalysts for Radical Change," White Paper, June, 1998.
  13. Workflow Management Coalition, "Workflow Security Considerations," White Paper, 1998.