期刊文献+

面向工作流应用的可组合授权模型 被引量:1

Composited authorization model for workflow applications
下载PDF
导出
摘要 针对分布式工作流系统授权管理的动态性、统一性和自治性的特点,将RBAC的授权管理思想和TBAC的动态访问机制结合起来,提出了支持工作流组合和动态授权控制的可组合授权模型。该模型提供了从工作流的组成结构和执行关系进行建模的方法,通过将各个处理单元的授权方案按照工作流的组合结构、执行依赖关系和主体依赖关系进行组合,从而构造适应更复杂的工作流系统的授权方案。对模型的定义和组合运算进行了形式化描述,给出了模型的表达能力和一致性、组合运算的兼容性和安全性的相关性质分析。最后介绍了支持动态授权的授权控制引擎原型。 Aiming at challenges of dynamic,united and autonomic in authorization management for distributed workflow system,a composited authorization model for workflow application systems is proposed,which combines authorization ideology of RBAC and dynamic access control mechanism of TBAC.The model provides methods of modelling on composition structures and execution relations in a workflow system,thus a corresponding authorization policy can be constructed by composing authorization policies of processing-units,according to composition structure,sexecution dependences and subject dependences in the workflow system.Formal descriptions of model definitions and composition calculus are presented.Expressive power and consistency of modelc,ompatibility of composition calculus and their security properties are analyzed in detail.Furthermore,the prototype of an authorization control engine for dynamic permission control is introduced.
作者 吴荣
出处 《计算机工程与应用》 CSCD 北大核心 2011年第2期91-94,216,共5页 Computer Engineering and Applications
基金 福建省自然科学基金(No.Z0511028) 华侨大学科研基金(No.04HZR09)~~
关键词 可组合授权模型 授权管理 动态访问控制 工作流系统 主动安全模型 composited authorization model authorization management dynamic access control workflow authorization active security model
  • 相关文献

参考文献12

  • 1邓集波,洪帆.基于任务的访问控制模型[J].软件学报,2003,14(1):76-82. 被引量:222
  • 2Sandhu R,Coyne E,Feinstein H.Role-based access control models[J].IEEE Computer, 1996,29:38-47.
  • 3范玉顺.工作流管理技术基础[M].北京:清华大学出版社,2001.
  • 4袁崇义.Petri-Net的原理与应用[M].北京:电子工业出版社,2005.
  • 5Bacon J, Yao W, Moody K.A model of OASIS role-based access control and its support for active security[C]//ACM Transactions on Information and System Security,2002:492-540.
  • 6Bertino E, Ferrari E, Bonatti P A.TRBAC : A temporal role-based access control model[C]//Proceedings of 5th ACM Workshop on Role-Based Access Control,Berlin,Germany,2000:21-30.
  • 7Zhang L,Ahn G,Chu B.A rule-based framework for role-based delgation and revocation[C]//ACM Transactions on Information and System Security(TISSEC),2003:404-441.
  • 8Atluri B,Huang W K.An authorization model for workflows[C]// Proceedings of the 5th European Symposium on Research in Computer Security, 1996:44-64.
  • 9Thomas R, Sandhu R.Task-based authorization controls(TBAC): A family of models for active and enterprise-oriented authorization management[C]//Proceedings of the IFIP WB11.3 Conference on Database Security, 1997: 11-13.
  • 10冀高峰,汤庸,刘晓玲,易盛.面向服务合成的访问控制技术研究[J].通信学报,2006,27(11):60-66. 被引量:1

二级参考文献24

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2ANDREWS T,CURBERA F,DHOLAKIA H,et al.Business Process Execution Language for Web Services,Version 1.1.Specification[S].BEA Systems,IBM Corp,Microsoft Corp,SAP AG,Siebel Systems,2003.
  • 3SANDHU R S,COYNE E J,FEINSTEIN H L,et al.Role-based access control models(A).IEEE Conputer 29[C].1996.38-47
  • 4BACON J,YAO W,MOODY K.A model of OASIS role-based access control and its support for active security[A].ACM Transactions on Information and Systerm Security[C].2002.492-540.
  • 5BERTINO E,FERRARI E,BONATTI P A.TRBAC:a temporal role-based access control model[A].Proceedings of 5th ACM Workshop on Role-Based Access Control[C].Berlin,Germany,2000.21-30.
  • 6CONVINGTON M,LONG W,STINIVASAN S,et al.Securing context-aware applicationsusing environment roles[A].ACM Symposium on Access Control Model an Technology[C].Chantilly,VA,2001.10-20.
  • 7JIG F,TANG Y.A description logic approach to represent and extend RBAC model[A].SPCA 2006 (Accepted)[C].2006.151-156.
  • 8ZHANG L,AHN G,CHUB.A rule-based framework for role-based delgation and revocation[A].ACM Transactions on Information and System Security(TISSEC)[C].2003.404-441.
  • 9ATLURI B,HUANG W K.An authorization model for workfiows[A].Proceedings of the 5th European Symposium on Research in Computer Security[C].1996.44-64.
  • 10COULOURIS G,DOLLIMORE J,ROBERTS M.Role and task-based access control in the PerDiS groupware pPlatform[A].Proceedings of the ACM Workshop on Role-Based Access Control[C].1998.115-121.

共引文献588

同被引文献14

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部