期刊文献+

基于情景约束的工作流柔性访问控制模型 被引量:8

Flexible context-constraint-based access control model for workflows
下载PDF
导出
摘要 针对现有的访问控制模型在工作流系统中,基于情景的动态授权和灵活的任务相关授权等问题,提出一个应用于工作流系统的基于情景约束的柔性访问控制模型.模型定义了基于情景约束的角色指派策略和角色授权策略,分析了策略间的关系,对策略间可能存在的冲突进行了分类,给出策略冲突的静态和动态检测规则,并提出优先级规则和冲突消解策略的概念,安全管理员可以根据系统需求灵活地确定冲突消解的方式;模型还给出基于最小角色指派策略集和最小角色授权策略集的角色分配与授权决策算法,实现了工作流系统中基于情景的动态授权,并支持用户-角色和角色-权限的自动指派. Access control models proposed so far provide no support for context-based dynamic authorization and flexible authorization policy definition for tasks.To address these issues,a flexible context-constraint-based access control model was proposed for workfolws.The concepts of contextconstraint-based role assignment policy and context-constraint-based role authorization policy were defined.The interrelationships between policies were analyzed and the conflicts exhibited by policies were classified.Static and dynamic conflict detection methods were provided to maintain the consistency of policies.By the introduction of two new concepts,priority rule and conflict resolution policy,a flexible approach to resolve conflicts were provide.The security administrator can choose the method of resolving conflicts flexibly according to system requirements by defining priority rules and conflict resolution policies.Furthermore,the role assignment algorithm and the authorization decision algorithm based on the minimum sets of role assignment policies and role authorization policies were given.The model provides support for context-based dynamic authorization,automatic user-role and role-permission assignment.
出处 《浙江大学学报(工学版)》 EI CAS CSCD 北大核心 2010年第12期2297-2308,共12页 Journal of Zhejiang University:Engineering Science
基金 浙江省重大科技专项社会发展资助项目(2008C13073 2009C03015-1)
关键词 工作流 角色指派策略 角色授权策略 冲突检测与消解 workflow role assignment policy role authorization policy conflict detection and resolution
  • 相关文献

参考文献28

  • 1李红臣,史美林,陈信祥.工作流系统中的业务过程描述及分析[J].计算机研究与发展,2001,38(7):798-804. 被引量:54
  • 2刑光林 洪帆.基于角色和任务的工作流访问控制模型.计算机工程与应用,2001,38(7):798-804.
  • 3洪帆,赵晓斐.基于任务的访问控制模型及其实现[J].华中科技大学学报(自然科学版),2002,30(1):17-19. 被引量:12
  • 4ATLURI V, HUANG W K. An authorization model for workflows[C] // Proceedings of the 5th European Symposium on Research in Computer Security. Rome: Springer- Verlag, 1996: 44- 64.
  • 5THOMAS R K, SANDHU R S. Task-based authoriza tion controls (TBAC) : a family of models for active and enterprise oriented authorization management[C] // Proceedings of the IFIP WG11. 3 Workshop on Database Security. Vancouver, Canada: Chapman & Hall, Ltd. , 1997: 11-13.
  • 6邓集波,洪帆.基于任务的访问控制模型[J].软件学报,2003,14(1):76-82. 被引量:222
  • 7尹建伟,徐争前,冯志林,陈刚,董金祥.增强权限约束支持的基于任务访问控制模型[J].计算机辅助设计与图形学学报,2006,18(1):143-149. 被引量:16
  • 8SEJONG O, SEOG P. Task-role-based access control model [J]. Information Systems, 2003, 28(6) : 533 - 562.
  • 9DEY A K. Providing architectural support for building context-aware applications[D]. Atlanta.. Georgia Institute of Technology, 2001 : 3 - 5.
  • 10HAN Wei-li, ZHANG Jun-jing, YAO Xiao-bo. Context sensitive access control model and implementation [C] //Proceedings of 5th International Conference on Computer and Information Technology. Shanghai, China: IEEE, 2005: 751-756.

二级参考文献65

  • 1尹建伟,徐争前,冯志林,陈刚,董金祥.增强权限约束支持的基于任务访问控制模型[J].计算机辅助设计与图形学学报,2006,18(1):143-149. 被引量:16
  • 2LIU Jianxun,CHEN Haiyan,TANG Mingdong.A Role-Based Semantic Authorization Framework for Workflow Management Systems[J].Chinese Journal of Electronics,2006,15(1):55-59. 被引量:1
  • 3[1]Sandhu R. Role-based access control models. IEEE Computer, 1996, 29(2): 34~47
  • 4[2]Yen S, Laih C. On the design of dynamic access control scheme with user authentication. Computer & Mathematics with Applications, 1993, 25(7): 27~32
  • 5Davis J,IEEE Data Engineering Bulletin,1995年,18卷,1期,25页
  • 6MOFFETT J D. Specification ol Management Policies and Discretionary Access Control [A]. Morris Sloman. Network and Distributed Systems Management [C]. Boston, Addison-Wesley, 1994. 455-480.
  • 7LUPU E, SLOMAN M. Conflicts in policy-based distributed systems management [J]. IEEE Transactions on Software Engineering- Special Issue on Inconsistency Management, 1999,25(6):852-869.
  • 8AHO A V HOPCROFT E ULLMAN J D.Data structures and algorithms [M].北京:清华大学出版社,2003.198-229.
  • 9DAMIANOU N, DLrLAY N. LUPU E, et al. Ponder, a language for specifying security and management policies for distributed systems [R]. London, Imperial College of Science,Technology & Medicine Department of Computing, 2001. 15-16,23-26.
  • 10BREWER D,NASH M. The Chinese wall security policy [A].IEEE. IEEE Symposium on Research in Security and Privacy[C]. California,IEEE,1989. 206-214.

共引文献345

同被引文献66

引证文献8

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部