期刊文献+

基于风险的工作流系统访问控制优化策略 被引量:1

Risk-based optimization schemes for workflow access control
下载PDF
导出
摘要 在面向服务的工作流访问控制模型中,角色的任务授权随着系统任务状态的变化而变化,一个任务往往有多个不同的角色指派方案。为了确定最优方案,在面向服务的角色访问控制模型基础上,引入了风险的概念,提出了形式化描述风险的方法。通过对不同角色执行任务风险的评估来确定执行角色,使工作流系统具有更好的安全性,同时通过角色风险权值的动态变化有效地平衡了角色间的负载,可以有效提高系统的效率。 Role assignment change dynamically with the change of state of the task in service-oriented workflow system. There are many role assignment schemes for the implementation of a task. In order to select better scheme, based on the serviceoriented role-based access control model in workflow system, introduced the concept of risk, and then proposed methods of describing risks. Through comparing the risks of implementing a task by different roles, system can select better access control assignment. And It can also balance the task load among roles with the change of risk weight of roles. The schemes can enhance the system security and flexibility.
出处 《计算机应用研究》 CSCD 北大核心 2009年第11期4295-4298,共4页 Application Research of Computers
基金 国家自然科学基金重大研究计划项目(90715029) 国家教育部高等学校科技创新工程重大项目培育资金项目(708066) 国家教育部新世纪优秀人才计划资助项目(2008)
关键词 风险 工作流 访问控制 服务 角色 risk workflow access control service role
  • 相关文献

参考文献21

  • 1张健,孙吉贵,李妮娅,胡成全,杨滨.工作流系统中一个基于多权角色和规则的条件化RBAC安全访问控制模型[J].通信学报,2008,29(2):8-16. 被引量:4
  • 2LIANG Zhi-gang, BAI Shu-ren. Role based workflow model [ C ]//Proc of IEEE International Conference on Systems, Man, and Cybernetics. Taipei : [ s. n. ] ,2006:4845-4849.
  • 3王小明,赵宗涛,郝克刚.工作流系统带权角色与周期时间访问控制模型[J].软件学报,2003,14(11):1841-1848. 被引量:23
  • 4许峰,赖海光,黄皓,谢立.面向服务的角色访问控制技术研究[J].计算机学报,2005,28(4):686-693. 被引量:56
  • 5WEI Yong-he, SHU Qi-lin. A delegation-based workflow access control model[ C]//Proc of the 1st International Symposium on Data. [ S. l. ] :Privacy and E-Commercee ,2007:478-483.
  • 6WANG Wen-yan, LONG Yun-liang. Research on extension to role based access control mechanism on workflow[ C]//Proc of the 3rd International Conference on Natural Computation. 2007.
  • 7AYED S, CUPPENS-BOULAHIA N, Managing access and flow control requirements in distributed workflows[ C]//Proc of IEEE. 2008:702- 710.
  • 8LU Y, ZHANG L. Types for task-based access control in workflow sys- tems[ J ]. IET Software ,2008,2(5 ) :461-473.
  • 9SHAFIQ B, SAMUEL A. A GTRBAC based system for dynamic workflow composition and management [ C ]//Proc of the 8th IEEE International Symposium on Object-Oriented Real-time Distributed Computing. 2005:87-93.
  • 10袁平鹏,陈刚,董金祥.多政策的两层协同应用存取控制模型[J].计算机辅助设计与图形学学报,2004,16(4):420-426. 被引量:19

二级参考文献76

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2尹建伟,徐争前,冯志林,陈刚,董金祥.增强权限约束支持的基于任务访问控制模型[J].计算机辅助设计与图形学学报,2006,18(1):143-149. 被引量:16
  • 3LIU Jianxun,CHEN Haiyan,TANG Mingdong.A Role-Based Semantic Authorization Framework for Workflow Management Systems[J].Chinese Journal of Electronics,2006,15(1):55-59. 被引量:1
  • 4邓集波 洪帆.基于任务的授权模型.软件学报,2003,14(1):76~82.http://www.jos.org.cn/1000-9825/14/76.htm.,.
  • 5[1]Sandhu, R. Issues in RBAC . In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 21~24.
  • 6[2]Jaeger, T. On the increasing importance of constraints. In: Proceedings of 4th ACM Workshop on Role-Based Access Control. Fairefax, VA: ACM Press, 1999. 33~42.
  • 7[3]Ahn, G.-J. The RCL2000 language for specifying role-based authorization constraints [Ph.D. Thesis]. Fairfax, VA: George Mason University, 1999.
  • 8[4]Sandhu, R., Coyne, E.J., Feinstein, H.L., et al. Role-Based access control models. IEEE Computer, 1995,29(2):38~47.
  • 9[5]Chen, Fang, Sandhu, R. Constraints for role-based access control. In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 39~46.
  • 10Fcrraiolo DF, Sandhu R, Guirila S, Kuhn DR, Chandramouli R. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 2001,4(3):224-274.

共引文献488

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部