Workflow Model for Distributed Access Control

被引:0
|
作者
Thomas, Manoj V. [1 ]
Sekaran, K. Chandra [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Surathkal 575025, Karnataka, India
关键词
Authentication; Authorization; Cloud Computing; Distributed Access Control; Identity Provider; Service Computing; Trust;
D O I
10.1109/ICACC.2013.78
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the distributed computing environments like cloud computing or service computing, users access various services and shared resources hosted by the service providers, to achieve their tasks done efficiently. Authentication and authorization are the two important functions to be performed in this context, to make sure that unauthorized users do not access the distributed system components. In this paper, we analyse the various distributed access control approaches already adopted in this area, considering the advantages and the disadvantages. We propose a distributed access control architecture for the cloud computing paradigm considering the present day requirements of the service consumers and service providers. We also give the workflow model for the proposed distributed access control system in the cloud. A few open issues in the area of distributed access control are also discussed.
引用
收藏
页码:363 / 366
页数:4
相关论文
共 50 条
  • [1] An authorization and access control model for workflow
    Chaari, S
    Biennier, F
    Ben Amar, C
    Favrel, J
    [J]. ISCCSP : 2004 FIRST INTERNATIONAL SYMPOSIUM ON CONTROL, COMMUNICATIONS AND SIGNAL PROCESSING, 2004, : 141 - 148
  • [2] Access control model based on graph for workflow
    Wei, Yong-He
    Wang, Cheng-En
    Luo, Xiao-Chuan
    [J]. Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2009, 15 (05): : 925 - 931
  • [3] Access control for workflow environment: The RTFW model
    Jiang, Hao
    Lu, Shengye
    [J]. COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN III, 2007, 4402 : 619 - +
  • [4] RTFW: An access control model for workflow environment
    Lu, Shengye
    Jiang, Hao
    [J]. 2006 10TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, PROCEEDINGS, VOLS 1 AND 2, 2006, : 1005 - 1009
  • [5] An Access Control Model for Workflow in Service Oriented Environment
    Wei, Yonghe
    Hao, Yongping
    Wang, Yang
    [J]. E-ENGINEERING & DIGITAL ENTERPRISE TECHNOLOGY VII, PTS 1 AND 2, 2009, 16-19 : 288 - 292
  • [6] Flexible policy access control model for workflow systems
    Ma, Chen-Hua
    Lu, Guo-Dong
    Qiu, Jiong
    [J]. Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2008, 42 (12): : 2112 - 2120
  • [7] A delegadon-based workflow access control model
    Wei, Yonghe
    Shu, Qilin
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 478 - 483
  • [8] A Role-Based Workflow Access Control Model
    Zhang Wen-dong
    Zhang Kai-ji
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 1136 - 1139
  • [9] An access control model of workflow system integrating RBAC and TBAC
    Zhou, Xiangning
    Wang, Zhaolong
    [J]. INTEGRATION AND INNOVATION ORIENT TO E-SOCIETY, VOL 2, 2007, 252 : 246 - +
  • [10] Research on access control model for workflow management in the PLM system
    Wan, Li
    Chen, Xing
    Liu, Qinghua
    [J]. Zhongguo Jixie Gongcheng/China Mechanical Engineering, 2006, 17 (SUPPL. 2): : 176 - 180