期刊文献+

基于角色的工作流授权约束规格说明 被引量:1

Specification of role-based authorization constraints in workflow management systems
下载PDF
导出
摘要 在工作流管理系统中,数据在工作流任务中流动,执行任务的用户在变化,用户的权限也在变化,现有的授权方法不能很好地描述上述这种职责分离的状态。为此,提出了一个工作流授权约束模型。该模型在工作流应用语境中定义了角色层次函数、任务偏序关系和互斥任务,在此基础上给出了一个基于角色的工作流授权约束语言,它可以准确描述工作流系统的职责分离要求,表达静态、动态授权约束和授权的历史信息,同时,所得到的约束规则集规模相对较小,保证了一致性验证在时间和空间上的可行性。 The existing approaches of authorization constraints cannot describe the separation of duties well in the workflow management systems under which with the data movement from one task to next, and the change of task executors and users' access control at any moment. To solve this problem, a model of workflow authorization constraints was proposed. The role level function, the task partial relationship and the conflicting tasks in the context of workflow application were defined in the model. Based on the model, a language named role-task-based Workflow Authorization Language (WAL) was put forward to specify the workflow authorization constraints. The requests on the separation of duties in the workflow system could be correctly described by WAL. Static and authorized historical information could also be expressed. Meanwhile, the size of rules set obtained was relatively smaller. Finally the feasibility of the consistency validation in the time and the space was verified.
出处 《计算机集成制造系统》 EI CSCD 北大核心 2005年第9期1312-1318,共7页 Computer Integrated Manufacturing Systems
基金 国家自然科学基金资助项目(60173006) 国家863/CIMS主题资助项目(2003AA118020)。~~
关键词 工作流 工作流管理系统 角色 授权约束 workflow workflow management systems role authorization constraints
  • 相关文献

参考文献10

  • 1ELISA B, ELENA F, ATLURI V. A flexible model supporting the specification and enforcement of role-based authorizations in workflow management systems[A]. Proceedings of the Second ACM Workshop on Role-Based Access Control [C]. New York, NY, USA: ACM Press, 1997. 1-12.
  • 2SANDHU R. Separation of duties in computerized information systems. Database Security IV: Status and Prospects. Holland, 1991. 179-189.
  • 3SANDHU R, COYNE E J, FEINSTEIN H L, et al. Rolebased access control models[J]. IEEE Computer, 1996, 29(2): 38-47.
  • 4JONSCHER D, MOFFET J, DITTRICH K. Complex subjects or the striving for complexity is ruling our world[A]. Database Security V Ⅱ: Status and Prospects[C]. Amsterdam,Holland: Elsevier North-Holland, Inc. , 1994.19-37.
  • 5NYANCHAMA M, OSBORN S. Role-based security, object oriented databases and separation of duty[J]. SIGMOD Record, 1993,22(4): 45-51.
  • 6AHN G J, SANDHU R. Role- based authorization constraints specification[J]]. ACM Transactions on Information and System Security,2000,3(4) :207-226.
  • 7ATLURI V, HUANG W K. An uthorization model for workflows[A]. Proceedings of the 5th European Symposium on Research in Computer Security, Lecture Notes in Computer Science[C]. London, U. K.: Springer- Verlag, 1996. 44- 64.
  • 8HUANG W K, ATIURI V. Secureflow: a secure Web-enabled workflow management systems[A]. Proceedings of the 4th ACM Workshop on Role-Based Access Control[C]. New York, NY, USA: ACM Press, 1999. 83-94.
  • 9ELISA B, ELENA F. The specification and enforcement of authorization constraints in workflow management systems [J]. ACM Transaction on Information and System Security,1999,2(1) :65-104.
  • 10WU Shengli, SHETH A, LUO Zongwei. Authorization and access control of application data in workflow systems [J].Journal of Intelligent Information Systems, 2002,18(1): 71-94.

同被引文献13

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部