A Context-sensitive Access Control Model for Workflow Environment

被引:0
|
作者
Zhu, Zhou [1 ]
Xu, Renzuo [1 ]
机构
[1] Wuhan Univ, State Key Lab Software Engn, Wuhan, Hubei Province, Peoples R China
关键词
Access control; Context-sensitive; Workflow; Task-role-based;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The access control is one of the key technologies to protect information systems from malicious and misusing attackers inside or outside the enterprise. Task-role-based Access Control (T-RBAC) model is proposed for enterprise environment through integration of Role-based Access Control (RBAC) model and Task-based Authorization Control (TBAC) model. The user is related with permission through role and task, and it supports task level access control and supervision role hierarchy. Although it has the advantages of RBAC and TBAC, it only considers a part of context information, such as task order and mutually exclusive tasks in workflow environment. This paper presents a dynamic context-sensitive access control model that extends the T RBAC model while retaining its advantages and dynamically grants and adapts permissions to users according to current context information of user and task. Issues of the least privilege and separation of duty are also discussed in the model.
引用
收藏
页码:955 / 961
页数:7
相关论文
共 50 条
  • [1] Context-sensitive access control model and implementation
    Han, WL
    Zhang, JJ
    Yao, XB
    Fifth International Conference on Computer and Information Technology - Proceedings, 2005, : 757 - 761
  • [2] CONTEXT-SENSITIVE ACCESS CONTROL MODEL FOR GOVERNMENT SERVICES
    Gostojic, Stevan
    Sladic, Goran
    Milosavljevic, Branko
    Konjovic, Zora
    JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2012, 22 (02) : 184 - 213
  • [3] A context-sensitive access control model and prototype implementation
    Cholewka, DG
    Botha, RA
    Eloff, JHP
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 341 - 350
  • [4] Context-sensitive Access Control Model for Business Processes
    Sladic, Goran
    Milosavljevic, Branko
    Konjovic, Zora
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2013, 10 (03) : 939 - 972
  • [5] Privacy challenges in Context-sensitive access control for pervasive computing environment
    Ahamed, Sheikh I.
    Talukder, Nilothpal
    Haque, Md. Munirul
    2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 510 - 515
  • [6] Context-sensitive Constraints for Access Control of Business Processes
    Milosavljevic, Gordana
    Sladic, Goran
    Milosavljevic, Branko
    Zaric, Miroslav
    Gostojic, Stevan
    Slivka, Jelena
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2018, 15 (01) : 1 - 30
  • [7] Dynamic Transitions of States for Context-Sensitive Access Control Decision
    Kayes, A. S. M.
    Rahayu, Wenny
    Dillon, Tharam
    Mahbub, Syed
    Pardede, Eric
    Chang, Elizabeth
    WEB INFORMATION SYSTEMS ENGINEERING, WISE 2018, PT I, 2018, 11233 : 127 - 142
  • [8] Context-sensitive access to information sources
    Smirnov, A.
    Levashova, T.
    Shilov, N.
    Pashkin, M.
    Kashevnik, A.
    Krizhanovsky, A.
    Komarova, A.
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2006, : 215 - +
  • [9] Access control for workflow environment: The RTFW model
    Jiang, Hao
    Lu, Shengye
    COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN III, 2007, 4402 : 619 - +
  • [10] A Context-Sensitive Dynamic Role-Based Access Control Model for Pervasive Computing Environments
    Emami, Sareh Sadat
    Zokaei, Saadan
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 2 (01): : 47 - 66