期刊文献+

基于角色访问控制在工作流管理系统中的应用研究 被引量:14

Study on the Application of Role-based Access Control in Workflow Management System
下载PDF
导出
摘要 针对实际应用的需求和工作流管理系统的特点 ,提出了一个适合工作流管理系统的基于角色的授权控制模型 ,并将该模型应用到基于过程分解的工作流模型中 ,从而得到一个具有基于角色的访问控制与授权机制的工作流管理系统 .对其中的静态以及动态约束问题进行了分析 . Taking the characteristics of WFMS (workflow management system) and the requirement of real application into consideration, this paper presents a role based access control model, which is suitable to workflow management systems, and applies it to the process discomposing based workflow model. The problem of the static and dynamic constraints in role based access control and authorization is introduced in some detail. Finally, it analyzes the architecture and implementation of a WFMS enactment system which supports RBAC.
出处 《小型微型计算机系统》 CSCD 北大核心 2003年第6期1067-1070,共4页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目 ( 60 0 73 0 3 5 699740 3 1)资助 国家 863 /CIMS项目 ( 2 0 0 1AA415 3 10 )资助
关键词 工作流 工作流管理系统 授权 基于角色的访问控制 约束 workflow workflow management system role based access control authorization constraints
  • 相关文献

参考文献5

二级参考文献16

  • 1张申生.从CIMS走向动态联盟[J].中国机械工程,1996,7(3):17-22. 被引量:89
  • 2蒋新松,张申生.敏捷竞争的挑战与思考[J].计算机集成制造系统-CIMS,1996,2(1):3-9. 被引量:73
  • 31,Ferraiolo D F, Kuhn R. Role-Based access control. In: Proceedings of the 15th National Computer Security Conference. Baltimore, MD, 1992. 554~563, http://hissa.ncsl.nist.gov/kuhn/
  • 42,Sandhu R, Samarati P. Access control: principles and practice. IEEE Communications, 1994,32(9):40~48
  • 53,Ramaswamy C, Sandhu R. Role-Based access control features in commercial database management systems. In: Proceedings of the 21st National Information Systems Security Conference. Virginia: U.S. Government Printing Office, 1998, http://www.list.gmu.edu/conferen.htm
  • 64,Sandhu R, Coyne E J, Feinstein H L et al. Role-Based access control models. IEEE Computers, 1996,29(2):38~47
  • 75 Sandhu R. Rationale for the RBAC96 family of access control models. In: Proceedings of the 1st ACM Workshop on Role-Based Access Control. ACM, 1997. http://www.list.gmu.edu/conferen.htm
  • 8贺岚,硕士学位论文,1996年
  • 9Chang C C,Inform Sci,1997年,96卷,1-2期,15页
  • 10Hw ang M S,Computers Security,1996年,15卷,1期,73页

共引文献244

同被引文献89

引证文献14

二级引证文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部