期刊文献+

安全工作流任务分配策略

Task Assigned Policy of Security Workflow
在线阅读 下载PDF
导出
摘要 工作流系统访问控制为企业的工作流安全技术框架提供了可靠的保证。基于任务角色的访问控制模型通过任务将角色和权限联系起来.然后给用户指派合适的角色.用户通过其指派的角色获得可以执行的任务。然而在工作流多个任务实例同时执行过程中用户通过角色获得多个任务需要同时执行,如果用户执行的任务选择不当,将会导致工作流中某一任务实例中途挂起或夭折。本文根据工作流执行的特点.在基于任务角色访问控制模型的基础上,时工作流执行过程中任务实例出现的瓶颈问题进行了分析,提出了任务基本分配策略,事务任务,互斥任务,任务基数约束等分配方案,有效地提高了工.作流的执行效率。 Workflow system access control provides reliable guarantee for workflow-security-technique framework of enterprise. Taskrole-based access control model is that roles and permission are not connected directly but are put together by tasks. However, while many task-instances ofworkflow are performing at the same time, users obtain many tasks to execute by role. If tasks that users will perform are selected incorrectly, this will make one task-instances suspended or come to an untimely end. Basing on task-role-based access control model and the characteristic of workflow performing, this paper analyzes the problem of bottle-neck while many task-instances of workflow are performing, advances rudimental assigned policy of tasks, transaction task, mutex-task, cardinality constraint of task, which can effectively improve executing efficiency of workflow.
作者 张海娟 付争方 任秦安 ZHANG Hal-Juan, FU Zheng-Fang, ILEN Qin-An (Department of Economics and Management,Ankang College,Ankang 725000, China)
出处 《电脑知识与技术》 2007年第6期1352-1353,1443,共3页 Computer Knowledge and Technology
基金 安康学院专项科研计划资助项目(项目编号2006AKXY010).
关键词 工作流 访问控制 事务任务 互斥任务 基数约束 Workflow Access control Transaction task Mutex-task Cardinality constraint
  • 相关文献

参考文献3

二级参考文献8

  • 1Rohit Khare. Web Security: A Matter of Trust. Sebastopol: O'Reilly & Associates Inc, 1997
  • 2Ferraiolo D, Kuhn R. Role-based access controls. In: Proc of the 15th NIST-NCSC National Computer Security Conference. Garthersburg, MD: National Institute of Standards and Technology, 1992. 554~563
  • 3Sandhu R, Conyne EJ, Lfeinstein H, et al. Role based access control models. IEEE Computer, 1996, 29(2): 38~47
  • 4Park Joon S, Sandhu R, Ahn Gail-Joon. Role-based access control on the Web. ACM Trans on Information and System Security, 2001, 4(1): 37~71
  • 5Thomas R K, Sandhu R. Task-based authentication controls (TABC): A family of models for active and enterprise-oriented authentication management. In: Proc of the IFIP WG11.3 Workshop on Database Security. London: Chapman & Hall, 1997. 166~181
  • 6D kristol, L Montulli. HTTP state management mechanism. RFC 2965, Network Working Group, Internet Engineering Task Force. http://www.ietf.org/rfc/rfc2965.txt, 2000
  • 7史美林,杨光信,向勇,伍尚广.WfMS:工作流管理系统[J].计算机学报,1999,22(3):325-334. 被引量:292
  • 8邓集波,洪帆.基于任务的访问控制模型[J].软件学报,2003,14(1):76-82. 被引量:222

共引文献235

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部