期刊文献+

业务过程管理中基于组织和角色语义的访问控制 被引量:2

Organization and Role Semantic Based Access Control of Rusiness Process Management
下载PDF
导出
摘要 针对现有业务过程访问控制方法不能充分满足业务过程管理(BPM)实际需求的问题,首先分析了基于角色的访问控制(RBAC)和基于任务的访问控制(TBAC)等方法的不足;然后提出了一种基于组织结构和角色语义的访问控制(OR-SBAC)模型和方法,并采用形式化方法描述了OR-SBAC模型及其部件;最后给出了OR-SBAC的应用案例。OR-SBAC进一步划分了角色和受控主体,使用企业的组织结构进行用户与角色间的关联,在角色授权过程中通过角色适配器,基于一阶谓词逻辑进行角色语义推理,并考虑了时间和空间上下文等问题。OR-SBAC方法的描述能力强,权限分配效率高,能够满足业务过程管理中访问控制的复杂性、多样性和灵活性等方面的需求。 Current access control methods of business process can not meet the practical requirements of business process management (BPM). In order to solve this problem, disadvantages of the access control methods including role-based access control (RBAC) and task-based access control (TBAC) are analyzed. Then, an organization and role semantic based access control (OR-SBAC) model and method are proposed, its model along with the formal description of its components is presented, and an application example is given. The OR-SBAC method provides further classification of the roles and the controlled subjects, utilizes organizational structure to describe the relationship between user and role, fulfills authorization through role adapter by illation based on role semantics, and considers contexts of time and space. The strong description ability and high authorization efficiency of the OR-SBAC method meets the requirements of complexity, variety and flexibility in BPM.
出处 《信息与控制》 CSCD 北大核心 2009年第3期276-280,共5页 Information and Control
基金 国家863计划资助项目(2006AA04Z166) 国家自然科学基金资助项目(60674080)
关键词 业务过程管理(BPM) 访问控制 组织结构 角色 语义 busingess process management (BPM) access control organizational structure role semantics
  • 相关文献

参考文献15

二级参考文献100

  • 1芮国荣,邢桂芬.基于角色和规则的访问控制[J].计算机应用,2005,25(4):864-866. 被引量:15
  • 2许峰,赖海光,黄皓,谢立.面向服务的角色访问控制技术研究[J].计算机学报,2005,28(4):686-693. 被引量:56
  • 3李帆,郑纬民.基于角色与组织的访问控制模型[J].计算机工程与设计,2005,26(8):2136-2140. 被引量:27
  • 4马亮,顾明.基于角色的工作流系统访问控制模型[J].小型微型计算机系统,2006,27(1):136-140. 被引量:14
  • 5[1]Anderson J P.Computer Security Technology Planning Study. ESD-TR -73-51, Vol. 1 and 2, Hanscom AFB, Mass., 1972 (also available as DTICAD-758206)
  • 6[2]Ames S R, Gasser J M, Schell R R. Security Kernel Design and Implementation:An Introduction, Com puter, 1983,6(7): 14-22
  • 7[3]Dept. of Defense Standard. Department of Defense Trusted Computer System Evaluation Criteria. DOD 5200.28-STD, GPO 1986-623-963,643 0, 1985-12-26
  • 8[4]Lampson B W. Dynamic Protection Structures. In Proceedings of the AFIPS Fall Joint Computer Conference, Volume 35, Las Vegas,Nevada, 1969-11:27-38
  • 9[5]Lampson B W. Protection. Proc. Fifth Princeton Symp. Information Sciences and Systems, Princeton Univ., Princeton, N.J.,1971-03: 437-443, Reprinted in Operating System Rev., 1974,8(1 ): 18-24
  • 10Bertino E, Ferrari E, Atkuri V. The specification and enforcement of authorization constraints in workflow management systems [J]. ACM Transactions on Information and System Security, 1999, 2( 1 ): 65~104

共引文献335

同被引文献18

引证文献2

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部