期刊文献+

基于TBAC的BPEL访问控制技术研究 被引量:2

The Research on TBAC-based Access Control of BPEL
下载PDF
导出
摘要 业务流程执行语言(Business Process Execution Language for Web Services)是一种可以定义抽象的和可执行的业务流程的语言。然而,BPEL缺乏访问控制方面的安全性考虑。本文主要关注基于BPEL的流程的访问控制的实现方法。我们对现有的基于任务的访问控制模型(Task-Based Access Control)进行扩展,修改了授权结构体的定义并重新定义了授权结构体的类型,并实现了从BPEL定义的流程到TBAC模型的映射,提出了一种TBAC应用到BPEL中的方法。本文最后讨论了下一步的研究工作。 Business Process Execution Language for Web Services is a language, which can be used to define abstract and executable processes. However, the security aspect of access control is explicitly mentioned to he outside the scope of BPEL. This paper focuses on the implement of access control in the BPEL-based processes. We extend the existing Task-Based Access Control model, modify the definition of authorization unit and redefine the types of authorization units. Moreover we implement the mapping from the process defined by BPEL to TBAC model, put forwards an approach of using TBAC in BPEL. The future work is mentioned at the end of the paper.
出处 《计算机科学》 CSCD 北大核心 2007年第2期132-136,共5页 Computer Science
基金 国家自然科学基金项目(60373081) 广东省自然科学基金项目(04105503 5003348) 教育部"新世纪优秀人才支持计划"资助项目
  • 相关文献

参考文献16

  • 1Andrews T,Curbera F, Dholakia H, et al. Business Process Execution Language for Web Services, Version 1. 1. Specification,BEA Systems, IBM Corp. ,Mierosoft Corp. , SAP AG, Siebel Systems, 2003
  • 2邓集波,洪帆.基于任务的访问控制模型[J].软件学报,2003,14(1):76-82. 被引量:222
  • 3Mendling J, Strembeck M, Stermsek G, et al, An Approach to Extract RBAC Models from BPEIAWS Processes. In:Proceedings of the 13th IEEE International Workshops on Enabling Teehnologies : Infrastructure for Collaborative Enterprises( WET ICE'04),2004
  • 4Atkinson B, Della-Libera G, Hada S, et al. Web Services Security.Specification, IBM Corp. ,Mircosoft Corp. ,VeriSign,Inc. , 2002
  • 5van der Aalst W,van Hee K.工作流管理——模型、方法和系统.王建民,文立杰,等译.清华大学出版社,2004.
  • 6Sandhu R S Coync E J,Feinstein H L,et al.Role-Based Access Control Models.IEEE Conputer,1996,29(2):38-47
  • 7Yao W,Moody K,Baeon J. A Model of OASIS Role-Based Access Control and its Support for Active Security. In: ACM Symposium on Access Control Model and Technology. ACM, Chantilly, VA,2001
  • 8Bertino E, Ferrari E, Bonatti P A. TRBAC: A Temporal Role-Based Access Control Model. In: Proceedings of 5th ACM Workshop on Role-Based Access Control. Berlin, Germany, 2000
  • 9Convington M, Long W, Stinivasan S, et al. Securing Context-a-ware Applications Using Environment Roles. In: ACM Symposium on Access Control Model an Technology. Chantilly, VA, 2001
  • 10Zhang L, Ahn G, Chu B. A Rule-Based Framework for Role-Based Delgation and Revocation. ACM Transactions on Information and System Security(TISSEC), 2003,6 (3)

二级参考文献1

共引文献221

同被引文献31

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部