An authorization and access control model for workflow

被引:0
|
作者
Chaari, S [1 ]
Biennier, F [1 ]
Ben Amar, C [1 ]
Favrel, J [1 ]
机构
[1] Univ Sfax, Ecole Natl Ingenieures Sfax, Sfax 3038, Tunisia
关键词
authorization; RBAC; security; workflow;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A workflow is a coordinated arrangement of related tasks in an automated process, the systematic execution of which, ultimately achieves some goal. Workflow Management Systems (WFMSs) are becoming very popular and are being used to support many of the day to day workflows in large organizations. Workflow management systems are used for critical and strategic appications. Since, security is an essential and fundamental part of workflows, the workflow management system has to manage and execute the workflows in a secure way. Security, in a workflow context, involves the implementation of access control security mechanisms to ensure that tasks are performed by authorized subjects only. In this paper we propose a workflow authorization model capable of specifying authorization in such a way that subjects gain access to required objects only during the execution of the task. We build our model over the well known RBAC framework, and that in addition extends RBAC by including new rules in order to be adaptable with workflow context.
引用
收藏
页码:141 / 148
页数:8
相关论文
共 50 条
  • [21] Research on Authorization Model of Attribute Access Control Based on Knowledge Graph
    Ma, Li
    Lao, Qidi
    Yang, Wenyin
    Yang, Zexian
    Yuan, Dong
    Bu, Zhaoxiong
    UBIQUITOUS SECURITY, UBISEC 2023, 2024, 2034 : 348 - 359
  • [22] Trustworthy Delegation-authorization Model Based on Collaborative Access Control
    Sun, Wei
    International Journal of Network Security, 2023, 25 (05) : 899 - 909
  • [23] An access control and authorization model with Open stack cloud for Smart Grid
    Rathod, Yagnik A.
    Kotwal, Chetan B.
    Pandya, Sohil D.
    Sondagar, Divyesh R.
    ADCAIJ-ADVANCES IN DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE JOURNAL, 2020, 9 (03): : 69 - 87
  • [24] Trust based Authorization and Access Control
    Feng Fujun
    Li Junshan
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 162 - 165
  • [25] Extensible Access Control with Authorization Contracts
    Moore, Scott
    Dimoulas, Christos
    Findler, Robert Bruce
    Flatt, Matthew
    Chong, Stephen
    ACM SIGPLAN NOTICES, 2016, 51 (10) : 214 - 233
  • [26] Constraint access control for direct authorization
    Han, WL
    Shi, XD
    Li, YS
    PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS 1 AND 2, 2005, : 69 - 73
  • [27] Authorization and access control in adaptive workflows
    Domingos, D
    Rito-Silva, A
    Veiga, P
    COMPUTER SECURITY - ESORICS 2003, PROCEEDINGS, 2003, 2808 : 23 - 38
  • [28] A Hybrid Authorization Model For Project-Oriented Workflow
    张晓光
    High Technology Letters, 2003, (03) : 92 - 96
  • [29] Authorization Model for Multilevel Security Workflow Based on RTBAC
    Wang, Lei
    Xie, Xiaoyao
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 520 - 523
  • [30] An access control model of workflow system integrating RBAC and TBAC
    Zhou, Xiangning
    Wang, Zhaolong
    INTEGRATION AND INNOVATION ORIENT TO E-SOCIETY, VOL 2, 2007, 252 : 246 - +