Controlling break-the-glass through alignment

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

21 Citations (Scopus)
2 Downloads (Pure)

Abstract

Modern IT systems have to deal with unpredictable situations and exceptions more and more often. In contrast, security mechanisms are usually very rigid. Functionality like break-the-glass is thus employed to allow users to bypass security mechanisms in case of emergencies. However, break-the-glass introduces a weak point in the system. In this paper, we present a flexible framework for controlling the use of break-the-glass using the notion of alignments. The framework measures to what extent a process execution diverges from the specification (i.e., using optimal alignments) and revokes the exceptional permissions granted to cope with the emergency when the severity of deviations cannot be tolerated. For the quantification of the severity of deviations, we extend alignment-based deviation analysis techniques by supporting the detection of high-level deviations such as activity replacements and swaps, hence providing a more accurate diagnosis of deviations than classical optimal alignments.
Original languageEnglish
Title of host publicationProceedings of the 5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2013, Washington DC, USA, September 8-14, 2013)
Place of PublicationPiscataway
PublisherInstitute of Electrical and Electronics Engineers
Pages606-611
ISBN (Print)978-0-7695-5137-1
DOIs
Publication statusPublished - 2013
Eventconference; 5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust; 2013-09-08; 2013-09-14 -
Duration: 8 Sep 201314 Sep 2013

Conference

Conferenceconference; 5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust; 2013-09-08; 2013-09-14
Period8/09/1314/09/13
Other5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust

Fingerprint Dive into the research topics of 'Controlling break-the-glass through alignment'. Together they form a unique fingerprint.

Cite this