An improved Role-based workflow Access Control Model

被引:0
|
作者
Zhao, Hui [1 ]
Fang, Zhiyi [1 ]
Xu, Peng [1 ]
Zhao, Lianyu [1 ]
Liu, Jin [1 ]
Wang, Tianyang [1 ]
机构
[1] Jilin Univ, Sch Comp Sci & Technol, Changchun 130012, Peoples R China
关键词
access control; authorization restriction; transaction; task; workflow;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Role-Based Access Control (RBAC) model is widely accepted as the model of access control of workflow management system (WFMS). However, the RBAC model exist a lot of limit when it describe the authorization constraint of access control. Especially, the RBAC model cannot express the transaction character and the phase authorization constraint when the role and the user perform the task. This paper proposed an improved role-Based access control model for WFMS. The new authorization concepts for WfMS are defined respectively. The access control rules of IRBAC model are build which can express complex access control constraints for WfMS.
引用
收藏
页码:551 / 556
页数:6
相关论文
共 50 条
  • [1] A Role-Based Workflow Access Control Model
    Zhang Wen-dong
    Zhang Kai-ji
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 1136 - 1139
  • [2] The application research of role-based access control model in workflow management system
    Wang, BY
    Zhang, SM
    Xia, XD
    [J]. GRID AND COOPERATIVE COMPUTING, PT 2, 2004, 3033 : 1034 - 1037
  • [3] The application of role-based access control in workflow management systems
    Liu, JX
    Sun, LX
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 5492 - 5496
  • [4] Role-based access control model for GIS
    Pan, Yuqing
    Sheng, Yehua
    Zhou, Jieyu
    [J]. GEOINFORMATICS 2007: GEOSPATIAL INFORMATION TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6754
  • [5] The research on role-based access control mechanism for workflow management system
    Wang, BY
    Zhang, SM
    [J]. GRID AND COOPERATIVE COMPUTING GCC 2004, PROCEEDINGS, 2004, 3251 : 729 - 736
  • [6] Application of an Improved Role-Based Access Control Model in OBS Security Mechanism
    Jiang, Xueying
    Zhang, Chengjun
    Liu, Kean
    Li, Shiyao
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL II, 2010, : 555 - 558
  • [7] An enhancement of the Role-Based Access Control model to facilitate information access management in context of team collaboration and workflow
    Le, Xuan Hung
    Doll, Terry
    Barbosu, Monica
    Luque, Amneris
    Wang, Dongwen
    [J]. JOURNAL OF BIOMEDICAL INFORMATICS, 2012, 45 (06) : 1084 - 1107
  • [8] Role-based Workflow Model in SRS
    Zhang, Lin
    Chen, Yan
    Zhang, Jinsong
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 1, 2010, : 388 - 392
  • [9] A role-based secure workflow model
    Song, Chunyan
    Xu, Jianliang
    Li, Shenhua
    Wang, Mingqiang
    [J]. SIXTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2007, : 764 - +
  • [10] Role-based access control
    [J]. Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200