An authorization and access control model for workflow

被引:0
|
作者
Chaari, S [1 ]
Biennier, F [1 ]
Ben Amar, C [1 ]
Favrel, J [1 ]
机构
[1] Univ Sfax, Ecole Natl Ingenieures Sfax, Sfax 3038, Tunisia
关键词
authorization; RBAC; security; workflow;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A workflow is a coordinated arrangement of related tasks in an automated process, the systematic execution of which, ultimately achieves some goal. Workflow Management Systems (WFMSs) are becoming very popular and are being used to support many of the day to day workflows in large organizations. Workflow management systems are used for critical and strategic appications. Since, security is an essential and fundamental part of workflows, the workflow management system has to manage and execute the workflows in a secure way. Security, in a workflow context, involves the implementation of access control security mechanisms to ensure that tasks are performed by authorized subjects only. In this paper we propose a workflow authorization model capable of specifying authorization in such a way that subjects gain access to required objects only during the execution of the task. We build our model over the well known RBAC framework, and that in addition extends RBAC by including new rules in order to be adaptable with workflow context.
引用
收藏
页码:141 / 148
页数:8
相关论文
共 50 条
  • [1] Authorization and access control of application data in workflow systems
    Wu, SG
    Sheth, A
    Miller, J
    Luo, ZW
    JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2002, 18 (01) : 71 - 94
  • [2] Authorization and Access Control of Application Data in Workflow Systems
    Shengli Wu
    Amit Sheth
    John Miller
    Zongwei Luo
    Journal of Intelligent Information Systems, 2002, 18 : 71 - 94
  • [3] An authorization model for collaborative access control
    Ma, Chen-hua
    Lu, Guo-dong
    Qiu, Jiong
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2010, 11 (09): : 699 - 717
  • [5] An authorization model for collaborative access control
    Chen-hua Ma
    Guo-dong Lu
    Jiong Qiu
    Journal of Zhejiang University SCIENCE C, 2010, 11 : 699 - 717
  • [6] Access control and authorization for protecting disseminative information in E-learning workflow
    Sun, Lili
    Wang, Hua
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2011, 23 (16): : 2034 - 2042
  • [7] Workflow Model for Distributed Access Control
    Thomas, Manoj V.
    Sekaran, K. Chandra
    2013 THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS (ICACC 2013), 2013, : 363 - 366
  • [8] A Workflow Authorization Model Based on Credentials
    XING Guang-lin~1
    2. Shenzhen Broadeast Television University
    WuhanUniversityJournalofNaturalSciences, 2006, (01) : 198 - 202
  • [9] Authorization model for multilevel security workflow
    Hong, Fan
    Li, Jing
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2002, 30 (01):
  • [10] Access control model based on graph for workflow
    Wei, Yong-He
    Wang, Cheng-En
    Luo, Xiao-Chuan
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2009, 15 (05): : 925 - 931