A Family of RBAC-Based Workflow Authorization Models

被引:0
|
作者
HONG Fan
机构
关键词
workflow authorization; temporal permission; RBAC;
D O I
暂无
中图分类号
TP399 [在其他方面的应用];
学科分类号
081203 ; 0835 ;
摘要
A family of RBAC-based workflow authorization models, called RWAM, are proposed. RWAM consists of a basic model and other models constructed from the basic model. The basic model provides the notion of temporal permission which means that a user can perform certain operation on a task only for a time interval, this not only ensure that only authorized users could execute a task but also ensure that the authorization flow is synchronized with workflow. The two advance models of RWAM deal with role hierarchy and constraints respectively. RWAM ranges from simple to complex and provides a general reference model for other researches and developments of such area.
引用
收藏
页码:324 / 328
页数:5
相关论文
共 50 条
  • [1] The RBAC-based user authorization in Sanxin ERP system
    Liu, LL
    Shu, J
    Zheng, JX
    [J]. PROCEEDINGS OF THE 11TH JOINT INTERNATIONAL COMPUTER CONFERENCE, 2005, : 155 - 158
  • [2] RBAC-based Delegation Authorization with Trust Computing and Collaborative Security Strategy
    Sun, Wei
    [J]. International Journal of Network Security, 2023, 25 (04) : 666 - 679
  • [3] Controlling information access in workflow management systems using RBAC-based model
    Chou, Shih-Chien
    Wu, Chien-Jung
    [J]. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2007, 30 (02) : 331 - 336
  • [4] An RBAC-based policy information base
    Squair, TE
    Jamhour, E
    Nabhen, RC
    [J]. SIXTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 171 - 180
  • [5] On Role Mappings for RBAC-based Secure Interoperation
    Hu, Jinwei
    Li, Ruixuan
    Lu, Zhengding
    [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 270 - 277
  • [6] FWAM: A flexible workflow authorization model using extended RBAC
    Yang, Le
    Choi, Yongsun
    Choi, Myeonggil
    Zhao, Xinlei
    [J]. PROCEEDINGS OF THE 2008 12TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS I AND II, 2008, : 625 - +
  • [7] Modeling of RBAC-based access control of virtual enterprise
    Chen, Dejun
    Zhou, Zude
    Ma, Yingzhe
    Pham, D. T.
    [J]. KYBERNETES, 2008, 37 (9-10) : 1242 - 1249
  • [8] A Risk Awareness Approach for Monitoring the Compliance of RBAC-based Policies
    Jaidi, Faouzi
    Ayachi, Faten Labbene
    [J]. 2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 454 - 459
  • [9] RBAC-Based Access Control Integration Framework for Legacy System
    Guo, He
    Lu, Guoji
    Wang, Yuxin
    Li, Han
    Chen, Xin
    [J]. WEB INFORMATION SYSTEMS AND MINING, 2010, 6318 : 194 - +
  • [10] RBAC-Based UAV Control System for Multiple Operator Environments
    Jeong, Hyeok-June
    Ha, Young-Guk
    [J]. COMPUTER APPLICATIONS FOR SOFTWARE ENGINEERING, DISASTER RECOVERY, AND BUSINESS CONTINUITY, 2012, 340 : 210 - +