期刊文献+

一种扩展的基于角色的工作流访问控制模型 被引量:1

A ROLE BASED EXTENDED CONTROL MODEL FOR WORKFLOW ACCESS
下载PDF
导出
摘要 提出了一个扩展的基于角色工作流访问控制模型E-WACM(Extended Workflow Access Control Model Based on Role)。该模型提供细粒度的授权控制,使授权更为灵活,更符合工作流过程的需要,加入的时间参数使授权过程与工作流过程相互协调,实现最小特权原则。 In this paper we present an Extended Workflow Access Control Model (E-EACM) on role basis. This model provides granule authorized management, makes authorization more flexible and accords with workflow process perfectly. Time parameter is added to the model to enable the authorizing process corresponding with workflow process and to realize the least privilege principle.
出处 《计算机应用与软件》 CSCD 北大核心 2008年第6期262-264,共3页 Computer Applications and Software
关键词 工作流 访问控制模型 授权控制 义务 条件 Workflow Access control model Authority control Obligations Conditions
  • 相关文献

参考文献7

  • 1Workflow Management Coalition. Workflow Security Considerations White Paper. Workflow Management Coalition. 2006(6) :98.
  • 2Thomas P K,Sandhu R S. Task-based Authorization Controls(TBAC) : A Family of Models for Active and Enterprise-oriented. Authorization Management,Proceedings of the IFIP WG11.3 Workshop on Database Security( Lake Tahoe, California) , Chapman & Hall, August 1997.
  • 3Vijayalakshmi Atluri, WeiKuang Huang. An Authorization Model for Workflows. In Proceedings of the 15th European Symposium on Research in Computer Security, in Lecture Notes in Computer Science, No. 1146, Springer-Verlag, 1996 ( 9 ).
  • 4Karin Venter, Martin S Olivier. The Delegation Authorization Model:A Model For The Dynamic Delegation of Authorization Rightsin A Secure Workflow Management System. in : ISSA2002, Muldersdrift, South Africa,2002, http ://citeseer. ist. psu. edu/561097. html.
  • 5Jacques Wainer, Paulo Barthelmess, Akhil Kumar. W-Rbac A Workflow Security Model Incorporating Controlled Overriding of Constraints. International Journal of Cooperative Information Systems 2003,12 (4): 455 - 485.
  • 6Dulce Domingos, Antonio Rito-Silva, Pedro Veiga. Authorization and Access Control in Adaptive Workflows. In Computer Security-ESORICS 2003 ( eds : E. Snekkenes, D. Gollmann ), LNCS, Springer, 2003 : 23 - 38.
  • 7Bertino E, Ferrari E, Aduri V. The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Transactions on Information and System Security 2,1,1999:65 - 104.

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部