A role-based secure workflow model

被引:2
|
作者
Song, Chunyan [1 ]
Xu, Jianliang [1 ]
Li, Shenhua [2 ]
Wang, Mingqiang [2 ]
机构
[1] Ocean Univ China, Dept Comp Sci & Technol, Qingdao 266100, Peoples R China
[2] Shandong Univ, Lab Cryptog Technol & Informat Secur, Jinan 250100, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1109/GCC.2007.24
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Workflow Management System is used for supporting many day-to-day workflows in large organizations. But heterogeneous and distributed computing systems make security management of WFMS decentralized, thus its security must be noticed. In this paper we propose a role-based secure workflow model which realizes the principle of separation of duties (SoD), the principle of least privilege, integrity, authorization and availability. We also portray the whole model as a multi-layered architecture with a multilayered state graph for expressing and analyzing the flow of authorization. The layers are, respectively, role layer task layer control layer and data layer.
引用
收藏
页码:764 / +
页数:2
相关论文
共 50 条
  • [1] Secure role-based workflow models
    Kandala, S
    Sandhu, R
    [J]. DATABASE AND APPLICATION SECURITY XV, 2002, 87 : 45 - 58
  • [2] Role-based Workflow Model in SRS
    Zhang, Lin
    Chen, Yan
    Zhang, Jinsong
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 1, 2010, : 388 - 392
  • [3] A Role-Based Workflow Access Control Model
    Zhang Wen-dong
    Zhang Kai-ji
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 1136 - 1139
  • [4] The Research on the Role-based Dynamic Workflow Model
    Wang Chengjun
    [J]. 2009 SECOND INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING: KAM 2009, VOL 2, 2009, : 358 - 360
  • [5] An improved Role-based workflow Access Control Model
    Zhao, Hui
    Fang, Zhiyi
    Xu, Peng
    Zhao, Lianyu
    Liu, Jin
    Wang, Tianyang
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 551 - 556
  • [6] A new role-based authorization model in a corporate workflow systems
    Lee, HH
    Lee, SY
    Noh, BN
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 701 - 710
  • [7] Research on the role-based interorganizational workflow
    Zhao, Wei-Dong
    Dai, Wei-Hui
    [J]. Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2003, 25 (08):
  • [8] A Role-based Adjacent Workflow Recommendation Technique
    Chen, Guangzhi
    Li, Lei
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENT COMMUNICATION, 2015, 16 : 303 - 306
  • [9] A Secure e-Governance Model Using Role-Based Delegation
    Bannore, Aparna
    Devane, Satish
    [J]. THIRD INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, 2019, 797 : 911 - 919
  • [10] The application research of role-based access control model in workflow management system
    Wang, BY
    Zhang, SM
    Xia, XD
    [J]. GRID AND COOPERATIVE COMPUTING, PT 2, 2004, 3033 : 1034 - 1037