期刊文献+

S-Shark安全工作流管理系统设计与实现 被引量:1

Design and implementation of S-Shark secure workflow management system
下载PDF
导出
摘要 以工作流信息模型安全机制不足为研究对象,通过模型扩展的方法,建立一种安全工作流访问控制模型ETRBAC。该模型在典型T-RBAC模型基础上,提出了职责分离约束和基数约束等问题的解决方案。结合优秀开源工作流管理系统Shark,设计并实现了ETRBAC模型中的相关安全机制,形成S-Shark(secure-Shark)工作流管理系统。S-Shark具有安全性、易用性和可扩展性等优势。 Considering the poor security mechanism in workflow management system, and with the method of improving work- flow information model, this paper presented a security workflow access control model. Based on the traditional model T- RBAC, the new model resolved the separation of duty constraint and cardinality constraint. Finally the paper implemented a secure workflow management system S-Shark(secure-Shark). S-Shark system was designed based on Java open source project Shark system, in which ETRBAC model' s secure mechanisms come to truth. The S-Shark system provides high security, convenient and high expansibility.
出处 《计算机应用研究》 CSCD 北大核心 2009年第4期1515-1516,1519,共3页 Application Research of Computers
基金 国家教育部科学研究重点资助项目(107106) 2008年度陕西师范大学青年科技资助项目(200801021)
关键词 工作流 工作流管理系统 访问控制 授权 约束 workflow workflow management access control authorization constraint
  • 相关文献

参考文献8

  • 1Workflow Management Coalition [ EB/OL]. http ://www. wfmc..org.
  • 2Enhydra Shark project [ EB/OL]. http://www. enhydra, org/work- flow/shark.
  • 3SEJONG O H, SEOG P. Task-role-based access control model[ J]. Information Systems,2003,28(6) :533-562.
  • 4付争方,王小明,刘丁,张宏琳.一种新的复杂信息系统访问控制模型[J].计算机应用研究,2007,24(8):42-44. 被引量:1
  • 5AALST Wvan der, HEE K van.工作流管理:模型、方法和系统[M].王建民,闻立杰,译.北京:清华大学出版社,2004.
  • 6LI Hong-chen,YANG Yun, CHEN T Y. Resource constraints analysis of workflow specifications[J]. Journal of System and Software, 2004,73(3) :271-285.
  • 7WU Sheng-li, SHETH A, MILLER J, et al. Authorization and access control of application data in workflow system[ J]. Journal of Intelligent Information Systems,2002,18 ( 1 ) : 71 - 94.
  • 8CHAARI S, BIENNIER F, BEN A C, et al. An authorization and access control model for workflow [ J ]. IEEE Computer, 2004,6 (4) : 141-148.

二级参考文献8

  • 1陈伟鹤,殷新春,茅兵,谢立.基于任务和角色的双重Web访问控制模型[J].计算机研究与发展,2004,41(9):1466-1473. 被引量:18
  • 2宋善德,刘伟.基于任务-角色的访问控制模型[J].计算机工程与科学,2005,27(6):4-6. 被引量:16
  • 3SNYDER L.Formal models of capability-based protection systems[J].IEEE Trans on Computers,1981,30(3):172-181.
  • 4SANDHU R,COYNE E,FEINSTEIN H.Role-based access control models[J].IEEE Computer,1996,29(6):38-47.
  • 5THOMAS R K,SANDHU R.Task-based authentication controls (TBAC):a family of models for active and enterprise-oriented authentication management[C]//Proc of the IFIP WG11.3 Workshop on Database Security.London:Chapman & Hall,1997:166-181.
  • 6OH S,PARK S.Task-role-based access control model[J].Information Systems,2003,28(6):533-562.
  • 7MILLER J A,FAN Mei,SHETH A P,et al.Security in Web-based workflow management systems[EB/OL].http://citeseer.ist.psu.edu/172884.html.
  • 8邓集波,洪帆.基于任务的访问控制模型[J].软件学报,2003,14(1):76-82. 被引量:222

同被引文献7

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部