期刊文献+

基于任务机制的工作流安全控制的研究

Research on Workflow's Security Control based on Task mechanism
下载PDF
导出
摘要 工作流技术是生产与办公提高效率的有效办法,然而工作流系统的安全问题却没有得到很好的解决。通过研究RBAC安全访问与控制技术的优缺点,结合工作流系统的安全需求,提出一种基于任务机制的RBAC模型。该模型引入任务群管理机制,通过任务的动态授权,实现对角色访问权限约束,消除角色最小权限约束假象,提高工作流的安全性能。 Workflow technology is the production and office effective way to improve efficiency,but the security of the workflow systems has not been satisfactorily resolved.By studying security access and control of RBAC and the security requirements of workflow system,proposed a RBAC model based on task mechanism.The model introduces the task mechanism through the dynamics of the task authorization,and eliminates the illusion on least privilege constraints.and improves the safety performance of the workflow.
作者 谢永 章义来
机构地区 景德镇陶瓷学院
出处 《计算机安全》 2011年第10期28-30,共3页 Network & Computer Security
关键词 RBAC 工作流 安全控制 任务机制 RBAC Workflow Security Control Task Mechanism
  • 相关文献

参考文献7

  • 1Savith K, Sandhu R. Secure R, ole--Based Workflow Models [C]. In Proceedings of the 15th IFIP WG Working Conference on Database Securty,2002: 45-58.
  • 2M J Moyer, M Ahamad. Generalized role-based access control[C]. In: Proc of the 21st Int' l Conf on Distributed Computing Systems. Phoenix: IEEE Computer Society,2001. 391-398.
  • 3David Ferraiolo and P, icha, rd Kuhn. P, ole-based access controls. Proceedings of the 15th NIST--NCSC National Computer Security Conference, Baltinore, MD, 1992, 554-563.
  • 4R.Sandhu, E.Coyne, H.Feinstein. Role--based access control models. IEEE Computer, 29(2): 38-47,1996.
  • 5Crampton J. A reference monitor for workflow systems with constrained task execution [C]. ACM Press. Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, SACMAT' 05. New York: ACM Press, 2005: 38-47.
  • 6Sandhu R S. Rationale for the RBAC96 Family of Access Control Models[C].Proceedings of the 1st ACM Workshop on Role- based Access Control, 1997.
  • 7SavithK, Sandhu R,. Secure Role-Based Workflow Models [C]. In Proceedings of the 15th IFIP Working Conference on Database Security, 2002: 45-58.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部