期刊文献+

应用角色访问控制的工作流动态授权模型 被引量:16

Workflow Dynamic Authorization Model with Role-Based Access Control
下载PDF
导出
摘要 形式化地描述了角色、用户、权限、任务单元、授权策略、授权约束等实体及其相互间的关系 ,提出将授权约束分为需求角色约束、需求用户约束、拒绝角色约束及拒绝用户约束 ,并在此基础上建立了授权约束的冲突检测规则 实现了授权流与工作流的同步 ,并通过授权约束的冲突检测确保了工作流的有效执行 The model formally describes the key elements of access control such as role, user, privilege, task unit, authorization strategy, authorization constraint and the relationship between these elements We identify the following four types of authorization constraints: require role constraints, require user constraints, deny role constraints and deny user constraints, then provide constraint consistency checking rules upon them In this model, authorization flow is synchronized with workflow and the workflow can be efficiently executed through the constraint consistency checking rules The main advantage of the model is its comprehensiveness, flexibility and practicability
出处 《计算机辅助设计与图形学学报》 EI CSCD 北大核心 2004年第7期992-998,共7页 Journal of Computer-Aided Design & Computer Graphics
基金 国家"八六三"高技术研究发展计划 ( 2 0 0 1AA412 0 10 )资助
关键词 基于角色访问控制 工作流 动态授权 授权约束 授权约束冲突检测 role based access control workflow dynamic authorization authorization constraint constraint consistency checking
  • 相关文献

参考文献6

  • 1韩伟力,陈刚,尹建伟,董金祥.权限约束支持的基于角色的约束访问控制模型与实现[J].计算机辅助设计与图形学学报,2002,14(4):333-338. 被引量:19
  • 2Ahn G J, Sandhu R S, Kang M, et al. Injecting RBAC to secure a web-based workflow system [A]. In: Proceedings of the 5th ACM Workshop on Role-Based Access Control, Berlin, 2000. 1~ 10
  • 3Atluri V, Huang W K. An authorization model for workflows [A]. In: Proceedings of the 5th European Symposium on Research in Computer Security, Rome, 1996. 44~64
  • 4Atluri V, Huang W K. A Petri net based safety analysis of workflow authorization models [J]. Journal of Computer Security, 2000, 8(2/3): 209~240
  • 5Huang W K, Atluri V. SecureFlow: A Secure Web-enabled Workflow Management System [A]. In: Proceedings of the 4th ACM Workshop on Role-based Access Control, Fairfax,Virginia, 1999. 83~94
  • 6Bertino E, Ferrari E, Atkuri V. The specification and enforcement of authorization constraints in workflow management systems [J]. ACM Transactions on Information and System Security, 1999, 2( 1 ): 65~104

二级参考文献3

共引文献18

同被引文献118

引证文献16

二级引证文献71

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部