期刊文献+

基于RBAC的工作流管理在UBIS系统中的应用

Workflow Management Based on RBAC in Application on Unified Business Information Service System
下载PDF
导出
摘要 文章针对工作流管理系统及基于角色访问控制的特点和实际应用的需求,在将基于角色的访问控制与工作流管理系统相结合时引入了约束的概念,从而简化权限控制的复杂度,提高了系统的安全性和性能。同时,文中使用了UML对系统的体系结构进行了详细分析介绍。最后,通过模型在中国联通统一经营信息服务系统中的实际应用,展现了基于RBAC的工作流管理系统在办公自动化系统中的优越性。 Taking the characteristics of workflow management system and RBAC (Role-Based Access Control) and the requirement of practical application into consideration,the paper presents a workflow management model based on RBAC which includes the concept of constraint. So the new model can reduce the complexity of the permission management and increase the security and performance of the system.This paper applies the UML into introducing the system architecture in detail.Finally,through the practical application in China Unicom's Unified Business Information Service system,it shows the superiority of the workflow management system based on RBAC in office automated system.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第32期196-199,212,共5页 Computer Engineering and Applications
基金 国家"十五"攻关项目(编号:2002BA906A21-13)资助
关键词 工作流 基于角色的访问控制 约束 UML 统一经营信息服务 Workflow, Role-Based Access Control (RBAC), constraint, UML, UBIS
  • 相关文献

参考文献7

二级参考文献23

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2[1]Ravi Sandhu,David Ferraiolo and Richard Kuhn.The NIST Mode for Role-Based Access Control:Towards A Unified Standard.ACM2000,47-63
  • 3[2]Matthnew J Moyer,Mustaque Ahamad.Generalized Role Based Access Control [J] .Proceedings International Conference on Distributed Computing Systems,2001,(4) :391-398
  • 4Hollingsworth D. The workflow reference model. Workflow Management Coalition. 1995.
  • 5Fan YS. Foundation of Workflow Management Technique. Beijing: Tsinghua University Press; Springer-Verlag, 2001 (in Chinese).
  • 6Rumbaugh J, Jacobson I, Booch G. The Unified Modeling Language Reference Manual. Addison Wesley Longman, Inc., 1999.
  • 7ITU-T Recommendation X.812. Security Frameworks for open Systems: Access Control Framework.
  • 8Sandhu R, Coyne E J. Role-based Access Control Models.IEEE Computer, 1996 (2).
  • 9Sandhu R. Role-based Access Control laboratory for Information Security Technology. ISSE Department, MS4A4,George Mason University, 1997.
  • 10Sandhu R, Bhamidipati V. The ARBAC97 Model for Role-based Administration of Roles: Preliminary Description and Outline. In Proceedings of the 2th ACM Workshop on Role-based Access Control, ACM,1997.

共引文献167

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部