期刊文献+

产品生命周期管理系统中工作流的访问控制模型 被引量:3

Access control model for workflow management system for PLM
下载PDF
导出
摘要 为了满足产品生命周期管理系统对流程的访问控制需求,在基于角色的访问控制模型的基础上,提出一种访问控制模型,实现了产品生命周期管理系统和工作流管理系统的共同授权。由产品生命周期管理系统管理企业中的文档和用户等信息,对其进行静态授权。在流程中,为实现动态授权,防止流程死锁和权限泄漏,引入基于流程实例的对象组,用于容纳在流程中的数据;同时,允许在流程、活动和对象组这3个层次上进行授权,不同层次的权限允许被继承和重定义。这样,不仅方便管理员进行授权,而且增加了授权灵活性,细化了授权粒度。 To meet the access control requirements of workflow in product lifecycle management (PLM) system, an access control model was proposed based on the Role Based Access Control Model (RBAC) to implement the co-authorization of the Workflow Management System (WfMS) and the PLM system. PLM system was employed to manage and conduct static authorization on information such as files and users. To implement dynamic access control and avoid process deadlock and privilege leakage, the object group based on process instance was introduced. It was used to contain and manage the data used in process. Moreover, authorization could he granted from three levels: process, activity, and object group in this model. The authorization of each level could be inherited and redefined. This method has facilitated the management of administrators, and improved the flexibility and authorization granularity.
作者 廖旭 张力
出处 《计算机集成制造系统》 EI CSCD 北大核心 2005年第10期1367-1371,共5页 Computer Integrated Manufacturing Systems
基金 国家863/CIMS主题资助项目(2002AA4Z3310 2003AA411022)~~
关键词 产品生命周期管理系统 工作流管理系统 访问控制 基于流程实例的对象组 product lifecycle management system workflow management system access control process instance based object group
  • 相关文献

参考文献6

  • 1WfMC. The workflow reference model TC00-1003[EB/OL].http:∥www. wfmc. org/standards/docs/tc003v11. pdf, 1995-01.
  • 2WfMC. Workflow security considerations-white paper TC-1019[EB/OL]. http:∥wfmc. org/standards/docs/TC- 1019_10_SecurityPaper_1998. pdf, 1998-02.
  • 3SANDHU R, COYNE R, FEINSTEIN H, et al. Role-based access control models[J]. IEEE Computer, 1996, 29(2) :38-47.
  • 4ATLURI V, HUANG W K. An authorization model for workflow[A]. Proceedings of the 4th European Symposium on Research in Computer Security[C]. NY, USA: ACM Press,1996. 238-255.
  • 5BERTINO E, FERRARI E, ATLURI V. The specification and enforcement of authorization constraints in workflow management systems[J]. ACM Transactions on Information and System Security, 1999, 2(1) : 65-104.
  • 6FERRAIOLO D F, SANDHU R, GAVRILA S. Proposed NIST standard for role- based access control [J]. ACM Transactions on Information and System Security, 2001, 4(3): 224-274.

同被引文献24

  • 1尹建伟,徐争前,冯志林,陈刚,董金祥.增强权限约束支持的基于任务访问控制模型[J].计算机辅助设计与图形学学报,2006,18(1):143-149. 被引量:16
  • 2卢亚辉,张力,刘英博.基于域的综合访问控制模型[J].计算机集成制造系统,2006,12(12):1978-1985. 被引量:6
  • 3MICHAEL G. Product lifecycle management[M]. New York, N. Y. ,USA:McGraw-Hill,2006.
  • 4ELISA B. RBAC models concepts and trends[J]. Computers and Security,2003,22(6) :511-514.
  • 5ANSI. ANSI INCITS 359-2004 Role based access control[S]. Washington, D. C. , USA:American National Standard for Information Technology, 2004.
  • 6GUTIERREZ V, ISLA M, PADEREWSKI R, et al. An architecture for access control management in collaborative enterprise systems based on organization models[J]. Science of Computer Programming, 2007,66 (1) : 44-59.
  • 7WAINER J, KUMAR A, BARTHELMESS P. DW-RBAC: a formal security model of delegation and revocation in workflow systems[J]. Information Systems, 2007,32 (3) : 365-384.
  • 8CHOU S. Embedding role-based access control model in object-oriented systems to protect privacy[J].The Journal of Systems and Software, 2004,71(1/2): 143-161.
  • 9OH S,PARK S. Task-role-based access control model[J]. Information System, 2003,28(6) : 533-562.
  • 10THOMAS R K, SANDHU R S. Task-based authorization co- ntrols:a family of models :or active and enterprise-oriented authori- zation managementEC://Proceedings of the IFIP WG11.3 Work- sbop on Database Security. London, UK:Chapman:::Holp, 1997.

引证文献3

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部