A Role-Based Workflow Access Control Model

被引:2
|
作者
Zhang Wen-dong [1 ]
Zhang Kai-ji [1 ]
机构
[1] China Univ Petr, Dept Comp Sci, Dongying, Peoples R China
关键词
access control; task; workflow; security level;
D O I
10.1109/ETCS.2009.521
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
According to the instance of workflow system, this paper proposed a role-based workflow authorization model which has level request. Compared to the traditional workflow access control model, mandatory access control idea is used for reference in this paper's model, every user and privilege is given a security level. User can implement a task or not is impacted not only by the time or the context of environment, but also by the level relation between the user and authority. This model has been further strengthened the security of data object, and could be used in the field of financial or military that has the higher security requirements.
引用
收藏
页码:1136 / 1139
页数:4
相关论文
共 50 条
  • [41] A privacy enhanced role-based access control model for enterprises
    Yang, CG
    Zhang, CN
    [J]. NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1012 - 1021
  • [42] AMTRAC: An administrative model for temporal role-based access control
    Sharma, Manisha
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. COMPUTERS & SECURITY, 2013, 39 : 201 - 218
  • [43] Applications of the oriented permission role-based access control model
    Chen, Liang
    Crampton, Jason
    [J]. 2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2007, : 387 - +
  • [44] Towards Trustworthy Delegation in Role-Based Access Control Model
    Toahchoodee, Manachai
    Xie, Xing
    Ray, Indrakshi
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 379 - 394
  • [45] A Novel Role-based Access Control Model in Cloud Environments
    Luo, Jun
    Wang, Hongjun
    Gong, Xun
    Li, Tianrui
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2016, 9 (01) : 1 - 9
  • [46] A spatio-temporal role-based access control model
    Ray, Indrakshi
    Toahchoodee, Manachai
    [J]. DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 211 - +
  • [47] Role-based access control model for ubiquitous computing environment
    Chae, SH
    Kim, W
    Kim, DK
    [J]. INFORMATION SECURITY APPLICATIONS, 2006, 3786 : 354 - 363
  • [48] A General Attribute and Rule Based Role-Based Access Control Model
    朱一群
    李建华
    张全海
    [J]. Journal of Shanghai Jiaotong University(Science), 2007, (06) : 719 - 724
  • [49] Information flow control among objects in role-based access control model
    Izaki, K
    Tanaka, K
    Takizawa, M
    [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, 2001, 2113 : 299 - 308
  • [50] Integrating object oriented role-based access control model with mandatory access control principles
    Zhang, CN
    Yang, CG
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2003, 43 (03) : 40 - 49