An authorization and access control model for workflow

被引:0
|
作者
Chaari, S [1 ]
Biennier, F [1 ]
Ben Amar, C [1 ]
Favrel, J [1 ]
机构
[1] Univ Sfax, Ecole Natl Ingenieures Sfax, Sfax 3038, Tunisia
关键词
authorization; RBAC; security; workflow;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A workflow is a coordinated arrangement of related tasks in an automated process, the systematic execution of which, ultimately achieves some goal. Workflow Management Systems (WFMSs) are becoming very popular and are being used to support many of the day to day workflows in large organizations. Workflow management systems are used for critical and strategic appications. Since, security is an essential and fundamental part of workflows, the workflow management system has to manage and execute the workflows in a secure way. Security, in a workflow context, involves the implementation of access control security mechanisms to ensure that tasks are performed by authorized subjects only. In this paper we propose a workflow authorization model capable of specifying authorization in such a way that subjects gain access to required objects only during the execution of the task. We build our model over the well known RBAC framework, and that in addition extends RBAC by including new rules in order to be adaptable with workflow context.
引用
收藏
页码:141 / 148
页数:8
相关论文
共 50 条
  • [41] An improved Role-based workflow Access Control Model
    Zhao, Hui
    Fang, Zhiyi
    Xu, Peng
    Zhao, Lianyu
    Liu, Jin
    Wang, Tianyang
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 551 - 556
  • [42] Access Control Scheme for Workflow
    Gao Lijun
    Zhang Lu
    Xu Lei
    2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, : 215 - 217
  • [43] A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control
    Uddin, Mumina
    Islam, Shareeful
    Al-Nemrat, Ameer
    IEEE ACCESS, 2019, 7 : 166676 - 166689
  • [44] Label-Based Access Control: An ABAC Model with Enumerated Authorization Policy
    Biswas, Prosunjit
    Sandhu, Ravi
    Krishnan, Ram
    ABAC'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON ATTRIBUTE BASED ACCESS CONTROL, 2016, : 1 - 12
  • [45] An authorization model for object-oriented databases and its efficient access control
    Morita, T
    Ishihara, Y
    Seki, H
    Ito, M
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 1998, E81D (06): : 521 - 531
  • [46] Access Control and Authorization in Smart Homes: A Survey
    Ziarmal Nazar Mohammad
    Fadi Farha
    Adnan O.M Abuassba
    Shunkun Yang
    Fang Zhou
    TsinghuaScienceandTechnology, 2021, 26 (06) : 906 - 917
  • [47] Sustainable authorization in enterprise workflow and authorized digital signature model
    Kurumsal iş akişinda sürdürülebilir yetki denetimi ve yetkili sayisal imza modeli
    Uʇur, Alper, 1600, Gazi Universitesi (29):
  • [48] Wireless access control with universal authorization certificate
    Dai, J
    Al-Hussayen, S
    Tobin, D
    Muppalaneni, N
    Frincke, D
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XV, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS III, 2002, : 198 - 202
  • [49] Access Control and Authorization in Smart Homes: A Survey
    Mohammad, Ziarmal Nazar
    Farha, Fadi
    Abuassba, Adnan O. M.
    Yang, Shunkun
    Zhou, Fang
    TSINGHUA SCIENCE AND TECHNOLOGY, 2021, 26 (06) : 906 - 917
  • [50] Indirect authorization topologies for grid access control
    Geethakumari, G.
    Negi, Atul
    Sastry, V. N.
    ICIT 2006: 9th International Conference on Information Technology, Proceedings, 2006, : 186 - 187