期刊文献+

基于属性约束的工作流访问控制模型

Attribute constraint based workflow access control model
下载PDF
导出
摘要 针对在工作流环境中不具备相应资质和能力的用户可能通过其担任的角色获取任务,进而获得访问权限的问题,提出在任务分配之前进行属性约束。用户和任务都具有属性和相应的属性表达式,用户属性反映用户具备的资质和能力,任务属性反映任务对用户资质和能力的要求,只有对应的属性表达式满足策略规则时系统才向用户进行任务授权。实例分析表明,该方法能够防止不具备相应资质和能力的用户获取任务权限,消除安全隐患,实现更加细粒度的访问控制。 In order to resolve the problem that users who lack of corresponding qualifications and ability in workflow environment might get access rights through its role, this paper presents attribute constraints before the tasks assignment. Users and tasks have certain attributes and corresponding attribute expressions, user attributes reflect their equipped apti-tude and ability and task attributes indicate its requirements to users in qualifications and ability. The system authorizes to users only when the corresponding rules are satisfied by attribute expressions. Case analysis shows this approach can pre-vent the users who lack of corresponding qualifications and ability to get the tasks so as to eliminate the safety hazards and achieve a more fine-grained access control.
出处 《计算机工程与应用》 CSCD 2014年第23期100-103,107,共5页 Computer Engineering and Applications
基金 国家科技支撑计划(No.2012BAH19F003)
关键词 工作流 任务 访问控制 属性约束 属性表达式 workflow task access control attribute constraint attribute expression
  • 相关文献

参考文献15

二级参考文献83

  • 1邢光林,洪帆.基于角色和任务的工作流访问控制模型[J].计算机工程与应用,2005,41(2):210-213. 被引量:42
  • 2徐洪学,郭秀英,刘永贤.基于RBAC的具有时空约束的工作流授权模型[J].东北大学学报(自然科学版),2006,27(2):217-220. 被引量:6
  • 3叶春晓,吴中福,符云清,钟将,冯永.基于属性的扩展委托模型[J].计算机研究与发展,2006,43(6):1050-1057. 被引量:17
  • 4陈传波,黄俊华.基于工作流任务状态的访问权限分配模型[J].计算机工程与科学,2006,28(7):87-90. 被引量:1
  • 5Wu Sheng-li,Sheth A,Miller J,et al.Authorization and access control of application data in workflow system[J].Journal of Intelligent Information System,2002, 18( 1 ) :71-94.
  • 6Thomas R K,Sandhu R S.Task based authorization controls(TBAC): A family of models for active and enterprise-oriented authorization management[C]//Proceedings of the IFIPW G11.3 Workshop on Database Security, 1997: 166-181.
  • 7Bertino E,Ferrari E,Atluri V.The specification and enforcement of authorization constraints in workflow management systems[J].ACM Transactions on Information and System Security, 1999,2(1 ):65-104.
  • 8Botha R A,Eloff J H P.Separation of duties for access control enforcement in workflow environments[J].IBM Systems Journal,2001, 40(3) :666-682.
  • 9Kumar A.A framework for handling delegation in workflow management systems[C]//Proceedings of Workshop on Information, Charlotte, NC, 1999 : 192-211.
  • 10Castano S, Casati F,FuginiM.Managing workflow authorization constraints through active database technology[J].Information Systems Frontiers, 2001,3 (3) :98-112.

共引文献97

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部