期刊文献+

A Family of RBAC-Based Workflow Authorization Models

A Family of RBAC-Based Workflow Authorization Models
下载PDF
导出
摘要 A family of RBAC-based workflow authorization models, called RWAM, areproposed RWAM consists of a basic model and other models constructed from the basic model. The basicmodel provides the notion of temporal permission which means that a user can perform certainoperation on a task only for a time interval, this not only ensure that only authorized users couldexecute a task but also ensure that the authorization flow is synchronised with workflow. The twoadvance models of RWAM deal with role hierarchy and constraints respectively RWAM ranges from simpleto complex and provides a general reference model for other researches and developments of suchareah. A family of RBAC-based workflow authorization models, called RWAM, areproposed RWAM consists of a basic model and other models constructed from the basic model. The basicmodel provides the notion of temporal permission which means that a user can perform certainoperation on a task only for a time interval, this not only ensure that only authorized users couldexecute a task but also ensure that the authorization flow is synchronised with workflow. The twoadvance models of RWAM deal with role hierarchy and constraints respectively RWAM ranges from simpleto complex and provides a general reference model for other researches and developments of suchareah.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期324-328,共5页 武汉大学学报(自然科学英文版)
基金 A Familyof RBA
关键词 workflow authorization temporal permission RBAC workflow authorization temporal permission RBAC
  • 相关文献

参考文献4

  • 1Nabil R. Adam,Vijayalakshmi Atluri,Wei-Kuang Huang.Modeling and Analysis of Workflows Using Petri Nets[J].Journal of Intelligent Information Systems.1998(2)
  • 2Sandhu R,Coyne E J,Feinstein H L,et al.Role based Access Control Models[].IEEE Computer.1996
  • 3Bertino E,Ferrari E,Atluri V.The Specification and Enforcement of Authorization Constraints in Workflow Management Systems[].ACM Transactions on Information and System Security.1999
  • 4Adam N R,Atluri V,Huang W K.Modeling and Analysis of Workflows Using Petri Nets[].Journal of Intelligent Information Systems Special Issue on Workflow and Process Management.1998

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部