An access control model of workflow system integrating RBAC and TBAC

被引:0
|
作者
School of Information and Electronic Engineering, ShanDong Institute of Business and Technology, Yantai [1 ]
264005, China
不详 [2 ]
264005, China
机构
关键词
6;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] An Access Control Model for Workflow in Service Oriented Environment
    Wei, Yonghe
    Hao, Yongping
    Wang, Yang
    E-ENGINEERING & DIGITAL ENTERPRISE TECHNOLOGY VII, PTS 1 AND 2, 2009, 16-19 : 288 - 292
  • [42] A delegadon-based workflow access control model
    Wei, Yonghe
    Shu, Qilin
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 478 - 483
  • [43] Flexible policy access control model for workflow systems
    Ma, Chen-Hua
    Lu, Guo-Dong
    Qiu, Jiong
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2008, 42 (12): : 2112 - 2120
  • [44] Implement of access control method in workflow management system
    School of Computer Science, South-central University for Nationalities, Wuhan 430073, China
    Wuhan Ligong Daxue Xuebao, 2006, 2 (61-64):
  • [45] A Role-Based Workflow Access Control Model
    Zhang Wen-dong
    Zhang Kai-ji
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 1136 - 1139
  • [46] The application research of role-based access control model in workflow management system
    Wang, BY
    Zhang, SM
    Xia, XD
    GRID AND COOPERATIVE COMPUTING, PT 2, 2004, 3033 : 1034 - 1037
  • [47] Integrating RBAC, MIC, and MLS in Verified Hierarchical Security Model for Operating System
    Devyanin, P. N.
    Khoroshilov, A., V
    Kuliamin, V. V.
    Petrenko, A. K.
    Shchepetkov, I., V
    PROGRAMMING AND COMPUTER SOFTWARE, 2020, 46 (07) : 443 - 453
  • [48] Integrating RBAC, MIC, and MLS in Verified Hierarchical Security Model for Operating System
    P. N. Devyanin
    A. V. Khoroshilov
    V. V. Kuliamin
    A. K. Petrenko
    I. V. Shchepetkov
    Programming and Computer Software, 2020, 46 : 443 - 453
  • [49] Integrating Delegation with the Formal Core RBAC Model
    Abdallah, Ali E.
    Takabi, Hassan
    FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 33 - 36
  • [50] I-RBAC: An identity& role based access control model
    Wang, Jin
    Li, Qiang
    Li, Daxing
    2007 IEEE INTERNATIONAL CONFERENCE ON CONTROL AND AUTOMATION, VOLS 1-7, 2007, : 1176 - +