期刊文献+

工程图纸设计系统中的工作流授权模型研究

Research and application of workflow authorization model in system of drawing design
下载PDF
导出
摘要 工程图纸设计是一个典型的工作流,它是严格的、由一系列相关设计任务组成的自动化过程。实际的工程图纸设计包含许多环节,如设计、提交、修改和审核等。不同的设计和管理人员在整个流程的不同阶段协同工作,并在每一阶段实现特定的目标。工程图纸设计工作流的这一特点使得授权成为其中的一个关键问题。针对此问题在分析经典基于角色的访问控制授权模型的基础上提出一种新的工作流授权模型SODAM。该模型引入了服务和动态授权的概念,增强了对用户权限和角色的控制,并使得授权对工作流的动态变化有了更强的适应性。最后给出了该模型在实时工程图纸设计系统中的应用。 A drawing design workflow is a typical workflow, and it is a strict coordinated arrangement of related tasks in an automated process. The process includes a lot of steps such as design, submit, revision, verify and so on. Different engineers and managers participate in the systematic execution of the process, and some goals are achieved in each step. Wherefore, authorization becomes an essential and fundamental part in the flow. The workflow and participants of drawing design are analyzed, and an RBAC based authorization model SODAM is proposed in this work. Service and dynamic authorization are introduced, by which role and permission are effectively controlled and authorization of dynamic workflow is made more adaptive and flexible. A real-time drawing design system is developed to verify the effectiveness of the proposed model.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第22期5536-5539,5543,共5页 Computer Engineering and Design
基金 中国矿业大学校基金项目(200617007)
关键词 工作流 授权 工作流安全 访问控制 角色 workflow authorization workflowsecurity access control role
  • 相关文献

参考文献9

二级参考文献47

  • 1陈伟鹤,殷新春,茅兵,谢立.基于任务和角色的双重Web访问控制模型[J].计算机研究与发展,2004,41(9):1466-1473. 被引量:18
  • 2金琼琤,杨树堂,蒋兴浩,李建华.基于T-RBAC的企业权限管理方法[J].计算机工程,2004,30(19):93-95. 被引量:8
  • 3钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 4Sandhu R, Coyne E J, Feinstein H L. Role-based access control models[J]. IEEE Computer, 1996,29(2):38-46.
  • 5范玉顺.工作流管理技术基础[M].清华大学出版社,2001..
  • 6R.S. Sandhu. Separation of duties in computerized information systems. In: S. Jajodia, C. E. Lanwehreds. Database SecurityⅣ. North Holland: Elsevier Science Publisher, 1991. 179~189.
  • 7R.S. Sandhu, E. J. Coyne, H. L. Feinstein, et al. Role-based access control models. IEEE Computer, 1996, 29(2): 38~47.
  • 8G.J. Ahn, R. S. Sandhu. Role-based authorization constraints specification. ACM Trans. Information and System Security,2000, 3(4): 207~226.
  • 9V. Atluri, W. K. Huang. An authorization model for workflows.In: Proc. 5th European Symposium on Research in Computer Security, Lecture Notes in Computer Science. New York:Springer-Verlag, 1996. 44~64.
  • 10V. Atluri, W. K. Huang. A Petri net based safety analysis of workflow authorization models. Journal of Computer Security,2000, 8(2): 83~94.

共引文献85

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部