Workflow Model for Distributed Access Control

被引:0
|
作者
Thomas, Manoj V. [1 ]
Sekaran, K. Chandra [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Surathkal 575025, Karnataka, India
关键词
Authentication; Authorization; Cloud Computing; Distributed Access Control; Identity Provider; Service Computing; Trust;
D O I
10.1109/ICACC.2013.78
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the distributed computing environments like cloud computing or service computing, users access various services and shared resources hosted by the service providers, to achieve their tasks done efficiently. Authentication and authorization are the two important functions to be performed in this context, to make sure that unauthorized users do not access the distributed system components. In this paper, we analyse the various distributed access control approaches already adopted in this area, considering the advantages and the disadvantages. We propose a distributed access control architecture for the cloud computing paradigm considering the present day requirements of the service consumers and service providers. We also give the workflow model for the proposed distributed access control system in the cloud. A few open issues in the area of distributed access control are also discussed.
引用
收藏
页码:363 / 366
页数:4
相关论文
共 50 条
  • [21] Access Control Scheme for Workflow
    Gao Lijun
    Zhang Lu
    Xu Lei
    [J]. 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, : 215 - 217
  • [22] A distributed access control model for Java']Java
    Molva, R
    Roudier, Y
    [J]. COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 291 - 308
  • [23] Distributed management of permission for access control model
    Cai, Fangbo
    He, Jingsha
    Zardari, Zulfiqar Ali
    Han, Song
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (02) : 1539 - 1548
  • [24] Access control model in distributed service sharing
    National CIMS Eng. Research Cent., Dept. of Automation, Tsinghua Univ., Beijing 100084, China
    [J]. Jisuanji Jicheng Zhizao Xitong, 2007, 3 (527-532):
  • [25] A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control
    Uddin, Mumina
    Islam, Shareeful
    Al-Nemrat, Ameer
    [J]. IEEE ACCESS, 2019, 7 : 166676 - 166689
  • [26] Multi-policy access control model for workflow management system
    Yu, Ling
    Chen, Bo
    Xiao, Jun-Mo
    [J]. Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice, 2009, 29 (02): : 151 - 158
  • [27] A Task-and-Role-Based Access Control Model for Workflow System
    yi, Xu
    [J]. DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 843 - 846
  • [28] A Location-Aware Access Control Model for Mobile Workflow Systems
    Decker, Michael
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2009, 4 (01) : 50 - 66
  • [29] An access control model based on organization and task in workflow for power system
    Wang, Baoyi
    Yu, Xiaobo
    [J]. Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2007, 31 (04): : 51 - 55
  • [30] Research on Access-control Model in E-Government workflow
    Li Duan-Ming
    Li Yu-Xiang
    [J]. ICFCSE 2011: 2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SUPPORTED EDUCATION, VOL 1, 2011, : 474 - 477