Integration of task-attribute based access control model for mobile workflow authorization and management
dc.contributor.author | Basnet, Rejina, author | |
dc.contributor.author | Ray, Indrakshi, advisor | |
dc.contributor.author | Abdunabi, Ramadan, advisor | |
dc.contributor.author | Ray, Indrajit, committee member | |
dc.contributor.author | Vijayasarathy, Leo R., committee member | |
dc.date.accessioned | 2019-06-14T17:06:10Z | |
dc.date.available | 2019-06-14T17:06:10Z | |
dc.date.issued | 2019 | |
dc.description.abstract | Workflow is the automation of process logistics for managing simple every day to complex multi-user tasks. By defining a workflow with proper constraints, an organization can improve its efficiency, responsiveness, profitability, and security. In addition, mobile technology and cloud computing has enabled wireless data transmission, receipt and allows the workflows to be executed at any time and from any place. At the same time, security concerns arise because unauthorized users may get access to sensitive data or services from lost or stolen nomadic devices. Additionally, some tasks and information associated are location and time sensitive in nature. These security and usability challenges demand the employment of access control in a mobile workflow system to express fine-grained authorization rules for actors to perform tasks on-site and at certain time intervals. For example, if an individual is assigned a task to survey certain location, it is crucial that the individual is present in the very location while entering the data and all the data entered remotely is safe and secure. In this work, we formally defined an authorization model for mobile workflows. The authorization model was based on the NIST(Next Generation Access Control) where user attributes, resources attributes, and environment attributes decide who has access to what resources. In our model, we introduced the concept of spatio temporal zone attribute that captures the time and location as to when and where tasks could be executed. The model also captured the relationships between the various components and identified how they were dependent on time and location. It captured separation of duty constraints that prevented an authorized user from executing conflicting tasks and dependency of task constraints which imposed further restrictions on who could execute the tasks. The model was dynamic and allowed the access control configuration to change through obligations. The model had various constraints that may conflict with each other or introduce inconsistencies. Towards this end, we simulated the model using Timed Colored Petri Nets (TCPN) and ran queries to ensure the integrity of the model. The access control information was stored in the Neo4j graph database. We demonstrated the feasibility and usefulness of this method through performance analysis. Overall, we tended to explore and verify the necessity of access control for security as well as management of workflows. This work resulted in the development of secure, accountable, transparent, efficient, and usable workflows that could be deployed by enterprises. | |
dc.format.medium | born digital | |
dc.format.medium | masters theses | |
dc.identifier | Basnet_colostate_0053N_15363.pdf | |
dc.identifier.uri | https://hdl.handle.net/10217/195323 | |
dc.language | English | |
dc.language.iso | eng | |
dc.publisher | Colorado State University. Libraries | |
dc.relation.ispartof | 2000-2019 | |
dc.rights | Copyright and other restrictions may apply. User is responsible for compliance with all applicable laws. For information about copyright law, please see https://libguides.colostate.edu/copyright. | |
dc.subject | attribute based access control | |
dc.subject | TCPN analysis | |
dc.subject | workflow security | |
dc.subject | policy machine | |
dc.subject | access control | |
dc.subject | workflow management | |
dc.title | Integration of task-attribute based access control model for mobile workflow authorization and management | |
dc.type | Text | |
dcterms.rights.dpla | This Item is protected by copyright and/or related rights (https://rightsstatements.org/vocab/InC/1.0/). You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s). | |
thesis.degree.discipline | Computer Science | |
thesis.degree.grantor | Colorado State University | |
thesis.degree.level | Masters | |
thesis.degree.name | Master of Science (M.S.) |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Basnet_colostate_0053N_15363.pdf
- Size:
- 2.02 MB
- Format:
- Adobe Portable Document Format