期刊文献+

基于角色的工作流系统访问控制模型 被引量:14

Role-Based Access Control Model for Workflow Systems
在线阅读 下载PDF
导出
摘要 5工作流技术在办公自动化、电子商务、电子政务等领域得到广泛关注,工作流系统的安全问题变得日益突出.访问控制是工作流系统安全机制的重要环节.本文在NIST推荐的标准RBAC模型的基础上,结合实际情况,提出一种基于角色的工作流系统访问控制模型WRBAC.该模型描述了用户、角色、许可、活动等要素之间的关系,给出了静态和动态授权约束规则,能有效防止重要信息的泄漏和商业欺诈,满足工作流系统对访问控制的需求. Nowadays workflow is coming into more and more notice in many areas such as OA, e-government, e-business. Security is a important problem in workflow environment. Access control is a vital component of Security. In this paper, a RBAC model in workflow environment (WRBAC) is introduced. The model is based on proposed NIST standard for RBAC, formally describes the relationship between the key elements of access control in workflow systems such as user, role, permission and activity, presents the static and dynamic constraints. The model can effectively reduce the risk of information leakage and fraud, meet the requirements for access control in workflow systems.
作者 马亮 顾明
出处 《小型微型计算机系统》 CSCD 北大核心 2006年第1期136-140,共5页 Journal of Chinese Computer Systems
基金 国家"八六三"基金项目(2003AA414030)资助.
关键词 工作流 安全 访问控制 角色 workflow security access control role
  • 相关文献

参考文献13

  • 1Workflow Management Coalition. The workflow reference model[Z]. Document Number TC-00-1003. Issue 1. 1. 19 Jan 1995.
  • 2Workflow Management Coalition. Workflow security considerations-white paper[Z]. Document Number WFMC-TC-IO19. Issue 1.0. Feb 1998.
  • 3Snyder L. Formal models of capability-based protection systems[J]. IEEE Transactions on Computers, 1981,30 (3) ; 172-181.
  • 4Ferraiolo D, Kuhn R. 1992. Role-based access control[C]. in Proceedings of the NIST-NSA National (USA) Computer Security Conference, 554-563.
  • 5Ferraiolo D F, Sandhu R et al. Proposed NIST standard forrole-based access control[J]. ACM Transactions on Information and System Security, 2001.4(3):224-274.
  • 6Thomas R K, Sandhu R S. Conceptual foundations for a model of task-based authorizations [C]. Computer Security Foundations Workshop VII, 1994. CSFW 7. Proceedings , 14-16 Jun 1994, 66-79.
  • 7Thomas R K, Sandhu R S. Task-based authorization controls(TBAC) : A family of models for active and enterprise-oriented authorization management[C]. Proceedings of the IF1P WG11.3 Workshop on Database Security, 1997:166-181.
  • 8Bertino E, Ferrari E, Atluri V. The specification and enforcement of authorization constraints in workflow management systems[J]. ACM Transactions on Information and System Security, 1999,2(1):65-104.
  • 9Reinhardt A Botha, Jan H P Eloff. Separation of duties for access control enforcement in workflow environments [J]. IBM Systems Journal, 2001,40(3) : 666-682.
  • 10Kumar A. A framework for handling delegation in workflow management systems[C]. Proceedings of Workshop on Information, Charlotte, NC, 1999.

二级参考文献5

共引文献13

同被引文献74

引证文献14

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部