期刊文献+

基于Web的安全工作流管理系统的设计 被引量:1

The Design of a Secure Workflow Management System on Web
下载PDF
导出
摘要 指出了已有的基于Web的工作流管理系统的缺陷,要么很少考虑系统的安全性,一般只提供了简单的身份验证,很难满足高安全工作流应用的需求;要么加上一个安全模块,这种方式可行,但通用性差.构建了一个基于Web的安全工作流管理系统,该系统采用从头设计而不是在已有的工作流系统上加一个安全模块的方法,具有很好的安全性和通用性. Abstract This paper discusses the deficiencies of existed workflow management systems based on web that either provided quite limited security functions, just basic identity verification, which can't meet the requirements of applications with high security or added a security module which is feasible but less generality, and designs a secure workflow management system based on web using top down manner but not only adding a security module, it is provided with excellent security and generality.
出处 《中南民族大学学报(自然科学版)》 CAS 2008年第1期85-88,共4页 Journal of South-Central University for Nationalities:Natural Science Edition
基金 中南民族大学自然科学基金资助项目(YZZ07008)
关键词 安全工作流 工作流管理系统 WEB技术 secure workflow workflow management system Web technology
  • 相关文献

参考文献5

  • 1Bussler C, Jablonski S, Schuster H. A new generation of workflow management systems: beyond taylorism with mobile [J]. ACM SIGOIS Bulletin, 1996, 17(1): 17-20.
  • 2Eder J, Groiss H, Liebhart W. The workflow management system pantarhei[C]//Dogac A,Kalinichenko M L, Ozsu T, et al. Advances in workflow management systems and interoperability. Istanbul. NATO Advanced Study Institute, 1997 : 129-144.
  • 3Huang W K, Atluri V. Secureflow: a secure webbased workflow management system [C]//VA. Proceedings of 4th ACM workshop on role-based access control. VA: Fairfax, 1999:83-94.
  • 4XING Guang-lin,HONG Fan,CAI Hui.A Workflow Authorization Model Based on Credentials[J].Wuhan University Journal of Natural Sciences,2006,11(1):198-202. 被引量:1
  • 5邢光林,洪帆.基于角色和任务的工作流授权模型及约束描述[J].计算机研究与发展,2005,42(11):1946-1953. 被引量:12

二级参考文献13

  • 1R.S. Sandhu. Separation of duties in computerized information systems. In: S. Jajodia, C. E. Lanwehreds. Database SecurityⅣ. North Holland: Elsevier Science Publisher, 1991. 179~189.
  • 2R.S. Sandhu, E. J. Coyne, H. L. Feinstein, et al. Role-based access control models. IEEE Computer, 1996, 29(2): 38~47.
  • 3G.J. Ahn, R. S. Sandhu. Role-based authorization constraints specification. ACM Trans. Information and System Security,2000, 3(4): 207~226.
  • 4V. Atluri, W. K. Huang. An authorization model for workflows.In: Proc. 5th European Symposium on Research in Computer Security, Lecture Notes in Computer Science. New York:Springer-Verlag, 1996. 44~64.
  • 5V. Atluri, W. K. Huang. A Petri net based safety analysis of workflow authorization models. Journal of Computer Security,2000, 8(2): 83~94.
  • 6E. Bertino, P. A. Bonatti, E. Ferrari. TRBAC: A temporal role-based access control model. ACM Trans. Information and System Security, 2001, 4(3): 191~223.
  • 7N.R. Adam, V. Atluri, W. K. Huang. Modeling and analysis of workflows using Petri nets. Journal of Intelligent Information Systems, 1998, 10(2): 131~158.
  • 8Nabil R. Adam,Vijayalakshmi Atluri,Wei-Kuang Huang.Modeling and Analysis of Workflows Using Petri Nets[J].Journal of Intelligent Information Systems.1998(2)
  • 9Sandhu R,Coyne EJ,Feinstein HL,et al.Role based Ac- cess Control Models[].IEEE Computer.1996
  • 10Kang M H,Park J S,Froscher J N.Access Control Mecha- nisms for Inter-Organizational Workflow[]..2001

共引文献11

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部