期刊文献+

工作流管理中基于规则策略的访问控制 被引量:3

Access control in workflow management systems based on rule strategy
下载PDF
导出
摘要 提出了一个工作流管理中基于规则策略的访问控制模型,给出了规则模型的集合表达和定义,重点分析了规则解释器的实现和关键算法,最后给出了一个应用。 This paper presented a design and implemented approach of rule strategy based access control to fulfill this requirement. And started with the set expressions and definition of the rule model, and focused on the implement of rule interpreter and some detailed algorithms. At last, also presented a practical application.
出处 《计算机应用研究》 CSCD 北大核心 2008年第3期885-887,902,共4页 Application Research of Computers
基金 国家“863”计划资助项目(2005AA113160) 江苏省高新技术重点资助项目(BG2006027)
关键词 工作流管理系统 访问控制 基于角色的访问控制 规则表达式 workflow management systems access control RBAC(role-based access control) rule expression
  • 相关文献

参考文献10

  • 1AHN G J, SANDHU R, KANG M, et al. Injecting RBAC to secure a Web-based workflow[ C ]//Proc of the 5th ACM Workshop on Role-based Access Control. 2000:1-10.
  • 2BOTHA R A, ELOFF J H P. Separation of duties for access control enforcement in workflow environment [ J ]. IBM System Journal End-to-End Security, 2001,40(3) :666-682.
  • 3WU S L, SHETH A, MILLER J, et al. Authorization and access control of application data in workflow systems [ J ]. ,Journal of Intelligent Information System, 2002,18( 1 ) :71-94.
  • 4BERTINO E, FERRARI E, ATLURI V. The specification and enforcement of authorization constrains in workflow management systems [J]. ACM Transactions on Information and System Security, 1999,2( 1 ) :65-104.
  • 5CRAMPTON J. On the satisfiablility of constraints in workflow systems[ EB/OL]. (2004). http://www, rhul. ac. uk/ mathematics/ techreports.
  • 6STREMBECK M, NEUMANN G. An integrated approach to engineer and enforce context constraints in RBAC environments [ J ]. ACM Transactions on Information and System Security, 2004,7(3) :392-427.
  • 7ESSMArR W, PROBST S, WEIPPL E. Role-based access controls: status, disseminations, and prospects for generic security mechanisms [ J]. Electronic Commerce Research, 2004, 4(1-2) :127-156.
  • 8BOTHA R A. CoSAWoE : a model for context sensitive access control in workflow environments [ D ]. [ S. l. ] : Department of Computer Science, Rand Afarikanns University, 2001 : 79-85.
  • 9FERRAIOLO D F, SANDHU R, GAVRILA S. Proposed NIST standard for role-based access control[,l]. ACM Transactions on Information and System Security, 2001,4 (3) :224- 274.
  • 10COVINGTON M J, LONG Wen-de, SRINIVASAN S. Securing context-aware applications using environment roles [ C ]//Proc of the 6th ACM Symposium on Access Control Models and Technologies. 2001 : 10-20.

同被引文献52

引证文献3

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部