Accessible Requires Authentication Published by De Gruyter Oldenbourg November 30, 2014

Information flow control for workflow management systems

Thomas Bauereiß and Dieter Hutter


Workflow management plays an important role in analyzing and automating business processes. Security requirements in workflow management systems are typically mapped to (role-based) access control configurations. This paper focuses on information flow control, taking into account implicit information leaks. The presented approach operates on a specification level in which no executable program is available yet. We illustrate the modeling of a workflow management system as a composition of state-event systems, each representing one of the activities of the workflow. This facilitates distributed deployment and eases verification by splitting up the verification of the overall system into verification of the individual components. Confidentiality requirements are modeled in terms of information flow predicates using the MAKS framework and verified following existing decomposition methodologies, which are adapted for open systems with ongoing user interaction. We discuss the interaction with other security requirements, notably separation of duty.

Received: 2014-5-30
Revised: 2014-10-5
Accepted: 2014-10-17
Published Online: 2014-11-30
Published in Print: 2014-12-28

©2014 Walter de Gruyter Berlin/Boston