期刊文献+

基于Web的工作流细粒度授权框架

A Web-Based Workflow Authorization Architecture with Fine Granularity
下载PDF
导出
摘要 基于Web环境下的工作流系统面临复杂的数据安全管理难题。Web环境下的授权资源种类繁多、差异性大,需要控制模型具有较细的授权粒度,以保证工作流系统管理的安全性和灵活性。文中分析传统授权模型,结合Web系统基于表单的特点,提出一种由表单模型、授权模型、流程模型构成的工作流细粒度授权框架。并对该方案进行描述,给予实现。 One of the most challenging problems in large distributed worlkflow management system is the complexity of security administration. The complex kinds of resources in the Web requires the fine granularity authorization to guarantee the security and agility of workflow management system. This paper compares merits of the general authorization models in the Web- based workflow environment, combines the characteristic that Web is based on form,gives a new Web-based workflow authorization architecture with fine granularity which is assemabled by form model, authorization model and flow model, and presents an instance of the system at last.
出处 《计算机技术与发展》 2006年第12期240-243,共4页 Computer Technology and Development
关键词 工作流 授权 细粒度 WEB XML workflow authorization fine granularity Web XML
  • 相关文献

参考文献6

  • 1范玉顺.工作流管理技术基础[M].清华大学出版社,2001..
  • 2Sandhu.Role-based Access Control models[J].IEEE Computer,1996,29(2):38-47.
  • 3Bertino E,Bonatti P A,Ferrari E.TRBAC:A temporal role -based access control model[J].ACM Transactions on Information and System Security,2001,4(3):191-223.
  • 4黄建,卿斯汉,温红子.带时间特性的角色访问控制[J].软件学报,2003,14(11):1944-1954. 被引量:73
  • 5王小明,赵宗涛,郝克刚.工作流系统带权角色与周期时间访问控制模型[J].软件学报,2003,14(11):1841-1848. 被引量:23
  • 6Thomas R K,Sandhu R.Task-based authentication controls(TABC):A family of models for active and enterprise-oriented authentication management[C]//In:Proc of the IFIP WG1113 Workshop on Database Security.London:Chapman & Hall,1997:166-181.

二级参考文献16

  • 1邓集波 洪帆.基于任务的授权模型.软件学报,2003,14(1):76~82.http://www.jos.org.cn/1000-9825/14/76.htm.,.
  • 2Fcrraiolo DF, Sandhu R, Guirila S, Kuhn DR, Chandramouli R. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 2001,4(3):224-274.
  • 3Botha RA, Eloff JHP. Access control in document centric workflow system: an agent-based approach. Computers & Security, 2001,20(6):525-532.
  • 4Wu SL, Sheth A, Miller J, Luo ZW. Authorization and access control of application data in workflow system. Journal of Intelligent Information System, 2002,18(1):71 -94.
  • 5Bertino E, Bonatti PA, Ferrari E. TRBAC: A temporal role-based access control model. ACM Transactions on Information and System Security, 2001,4(3): 191-223.
  • 6Ferraiolo DF, Sandhu R, Gavrila S. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 2001,4(3):224-274.
  • 7Osbom S, Sandhu R. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, 2000,3(2):85-106.
  • 8AHN G-J, Sandhu R. Role-Based authorization constraints specification. ACM Transactions on Information and System Security, 2000,3(4):207-226.
  • 9Sandhu R. Issues in RBAC. In: Youman C, Sandhu R, Coyne E, eds. Proceedings of the 1st ACM Workshop on Role-based access control. ACM Press, 1996. 21-24.
  • 10Ferraiolo D, Kuhn R. Role based access control. In: Proceedings of the 15th National Computer Security Conference, National Institute of Standards and National Computer Security Center. 1992. 641-650.

共引文献378

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部