期刊文献+

多策略的工作流管理系统访问控制模型 被引量:4

Multi-policy access control model for workflow management system
原文传递
导出
摘要 针对RBAC模型中没有明确定义模型的非法信息流,也没有提供信息流控制策略,会带来严重的信息泄露问题,对传统的军用安全模型加以改进,并推广到工作流管理系统中,提出了一种基于安全信息流和角色的多策略工作流管理系统访问控制模型,给出了模型的形式化定义、检测系统中合法信息流的算法.新模型为每个角色增加安全类,同时也为每个客体分配一个安全类,在基于角色进行访问控制的同时根据安全信息流进行访问控制,可以很好地解决目前基于角色的工作流管理系统访问控制模型中的信息泄露问题,增强系统的安全性.将该方法应用于开发的工作流管理系统中,收到了很好的效果. RBAC does not explicity define illegal information flow,nor does it provide any information flow control,which may enable some users to get unauthorized information.Traditional military security model is improved and extended to workflow management system in this paper.Security information flow and rolebased multi-policy access control(MPAC) model for workflow management system is proposed.The model is formalized and the detect algorithm for security information flow are also presented.We add security class...
出处 《系统工程理论与实践》 EI CSCD 北大核心 2009年第2期151-158,共8页 Systems Engineering-Theory & Practice
基金 江苏省普通高校自然科学研究计划(08KJD520017) 国家自然科学基金(60875001)
关键词 工作流 工作流管理系统 基于角色的访问控制 军用安全模型 信息流控制 workflow workflow management system role-based access control military security model information flow control
  • 相关文献

参考文献2

二级参考文献18

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2Workflow Management Coalition. The workflow reference model[Z]. Document Number TC-00-1003. Issue 1. 1. 19 Jan 1995.
  • 3Workflow Management Coalition. Workflow security considerations-white paper[Z]. Document Number WFMC-TC-IO19. Issue 1.0. Feb 1998.
  • 4Snyder L. Formal models of capability-based protection systems[J]. IEEE Transactions on Computers, 1981,30 (3) ; 172-181.
  • 5Ferraiolo D, Kuhn R. 1992. Role-based access control[C]. in Proceedings of the NIST-NSA National (USA) Computer Security Conference, 554-563.
  • 6Ferraiolo D F, Sandhu R et al. Proposed NIST standard forrole-based access control[J]. ACM Transactions on Information and System Security, 2001.4(3):224-274.
  • 7Thomas R K, Sandhu R S. Conceptual foundations for a model of task-based authorizations [C]. Computer Security Foundations Workshop VII, 1994. CSFW 7. Proceedings , 14-16 Jun 1994, 66-79.
  • 8Thomas R K, Sandhu R S. Task-based authorization controls(TBAC) : A family of models for active and enterprise-oriented authorization management[C]. Proceedings of the IF1P WG11.3 Workshop on Database Security, 1997:166-181.
  • 9Bertino E, Ferrari E, Atluri V. The specification and enforcement of authorization constraints in workflow management systems[J]. ACM Transactions on Information and System Security, 1999,2(1):65-104.
  • 10Reinhardt A Botha, Jan H P Eloff. Separation of duties for access control enforcement in workflow environments [J]. IBM Systems Journal, 2001,40(3) : 666-682.

共引文献26

同被引文献42

  • 1张功萱,沈创业,王平立,王玲.移动存储信息的信任链动态跟踪技术研究[J].计算机研究与发展,2011,48(S1):37-42. 被引量:3
  • 2王君,樊治平,刘鲁.一种基于角色的知识管理系统的动态组装模[J].系统工程与电子技术,2004,26(6):806-810. 被引量:5
  • 3马亮,顾明.基于角色的工作流系统访问控制模型[J].小型微型计算机系统,2006,27(1):136-140. 被引量:14
  • 4刘玉林,王建新,谢永志.涉密信息系统风险评估与安全测评实施[J].信息安全与通信保密,2007,29(1):142-144. 被引量:8
  • 5吴世忠,石超英.一种智能卡和U盘复合设备及其与计算机通信的方法[P].中国专利:CN200710000328.3,2007-01-08.
  • 6Burgess M, Fagernes S. Norms and swarms[C]// Lecture Notes in Computer Science, 2007, 4543: 109-120.
  • 7Simon R, Zurko M. Separation of duty in role-based environments[C]// Proceedings of the 10th Computer Security Foundations Workshop, New York: IEEE Press, 1997:183 -194.
  • 8Gligor V, Gavrila S, Ferraiolo D. On the formal definition of separation-of-duty policies and their composi- tion[C]// Proceedings of Symposium on Security and Privacy, New York: IEEE Press, 1998: 172-183.
  • 9Sandhu R. Role activation hierarchies[C]// Proceedings of the Third ACM Workshop on Role-based Access Control, New York: ACM Press, 1998:33- 40.
  • 10Barka E, Sandhu R. Framework for role-based delegation models[C]//Proceedings of the 16th Annual Computer Security Applications Conference, New York: IEEE Press, 2000: 168-176.

引证文献4

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部