期刊文献+

基于任务角色的工作流模糊访问控制模型

A Workflow Fuzzy Access Control Model Based on Task and Role
下载PDF
导出
摘要 引入模糊逻辑的思想,在基于任务角色的访问控制模型和工作流执行特点的基础上,提出了基于任务角色的工作流模糊访问控制模型,根据用户的基本信息和历史记录,运用模糊综合评判法计算出执行工作流任务的用户最佳选择,有效地提高了资源的利用率和工作流的执行效率. The ideal of fuzzy logic is introduced,and a workflow fuzzy access control model based on task and role is put forward,which is based on TRBAC model and the characteristics of workflow performance.According to users fundamental information and history record,the appropriate user is found using the fuzzy synthetic judgement method.The utilization rate of resource and executing efficiency of workflow are improved effectively.
出处 《郑州大学学报(理学版)》 CAS 2007年第3期69-72,共4页 Journal of Zhengzhou University:Natural Science Edition
基金 安康学院专项科研计划资助项目 编号2006AKXY010
关键词 工作流 访问控制 角色 任务 模糊综合评判法 workflow access control role task fuzzy synthetic judgement method
  • 相关文献

参考文献7

  • 1洪帆,罗炜.工作流管理系统安全模型[J].华中科技大学学报(自然科学版),2003,31(12):4-6. 被引量:11
  • 2[3]Sandhu R,Coyne E,Feinstein H.Role-based access control models[J].IEEE Computer,1996,29(6):38-47.
  • 3[4]Thomas R K,Sandhu R.Task-based authentication controls (TABC):a family of models for active and enterprise-oriented authentication management[C]//Proceedings of the IFIP WG11.3 Workshop on Database Security.London:Chapman & Hall,1997:166-181.
  • 4邓集波,洪帆.基于任务的访问控制模型[J].软件学报,2003,14(1):76-82. 被引量:222
  • 5[6]Sejong O,Seog P.Task-role-based access control model[J].Information Systems,2003,28(6):533-562.
  • 6[7]Wil van der Aalst,Kees van Hee.Workflow Management[M].王建民,闻立杰,译.北京:清华大学出版社,2004:56-76.
  • 7邢光林,洪帆.基于角色和任务的工作流访问控制模型[J].计算机工程与应用,2005,41(2):210-213. 被引量:42

二级参考文献10

  • 1WFMC.TC00-1019:Workflow Management Coalition Workflow Security Considerations White Paper.1998.
  • 2Ravi S Sandhu et al.Role-based Access Control Models[J].IEEE Computer, 1996; 38-47.
  • 3Savith Kandala,Ravi Sandhu.Secure Role-Based Workflow Models. http ://www.list.gmu.edu/confrnc/ifi p/i01-rbwm.pdf.
  • 4Vijayalakshmi Atlurl ,Wei-Kuang Huang.An Authorization Model for Workflows[C].In :Proc of the Fifth European Symposium on Research in Computer Security, 1996.
  • 5Vijayalakshmi Atlufi ,Wei-Kuang Huang.A Petri Net Based Safety Analysis of Workflow Authorization Models[J].Journal of Computer Security, 1999.
  • 6Bertino E,Bonatti PA,Ferrari E.TRBAC:A temporal role-based access control model[J].ACM Transactions on Information and System Security,2001 ;4(3) : 191-223.
  • 7Ravi S Sandhu.Separation of Duties in Computerized Information Systems[C].In:Sushil Jajodia,Carl Landwehr eds.Database Security, IV:Status and Prospects,North Holland,1991:179-189.
  • 8Nabil R Adam, Vijayalakshmi Atluri, Wei-Kuang Huang.Modeling and Analysis of Workflows Using Petri Nets[J].Journal of Intelligent Information Systems, 1998; 10(2) : 1-29.
  • 9David F Ferraiolo,Ravi Sandhu,Serban Gavrila et al.Proposed NIST Standard for Role-Based Access Control[J].ACM Transactions on Information and Systems Security,2001 ;4(3):224-274.
  • 10史美林,杨光信,向勇,伍尚广.WfMS:工作流管理系统[J].计算机学报,1999,22(3):325-334. 被引量:291

共引文献264

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部