PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

A Flexible Policy-Based Access Control Model for Workflow

Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
PL
Elastyczny parametryzowany wytycznymi model dostępu do sieci przy przepływie informacji
Języki publikacji
EN
Abstrakty
EN
In recent years, more and more attentions have been paid on the security of Workflow Management Systems (WFMSs) for its importance both in research and commercial realms. Access control is crucial to security management in WFMSs. A novel dynamic policy-based access control model for WFMSs called PAWF is presented to satisfy the particular requirements of WFMSs. The proposed model supports fine-grained authorization based on authorization policies and a prototype system is developed to prove the effectiveness of the proposed access control model.
PL
Zaprezentowano nowy model dostępu do sieci PWWF przy przepływie informacji.
Rocznik
Strony
67--71
Opis fizyczny
Bibliogr. 13 poz., schem., tab.
Twórcy
autor
autor
autor
autor
Bibliografia
  • [1] WFMC. Workflow Management Coalition: Terminology & Glossary. WFMC-TC-1011, Issue 3.0,1999
  • [2] WFMC. Workflow management coalition: workflow reference model. WFMC-TC00-1003, Issue 1.1,1995
  • [3] WFMC. Workflow management coalition: Workflow Security Considerations-White Paper. WFMC-TC-1019, Issue 1.0, 2001
  • [4] D.F. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Kuhn, R. Chandramouli. Proposed NIST Standard for Role-Based Access Control, ACM Trans. Information and System Security, 4(2001), No. 3, 224-274
  • [5] Sejong Oh, Seog, Park. Task-role-based Access Control Model, Information System, 28(2003): 533 -562
  • [6] Xie Dongwen, Liu Min,Wu Cheng. Policy-based access control in enterprise information system, In Computer Integrated Manufacturing Systems,11( 2005), No 4,561-564
  • [7] Lin Zhi, Wang Jing, Chen Xiao-su, Jia Lian-xing. Research on Policy-based Access Control Model, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009,164-167,
  • [8] N. Li, M. V. Tripunitara. On safety in discretionary access control, IEEE Security and Privacy, 2005.
  • [9] Claude Girault, Rudiger Valk. Petri Nets for System Engineering: A Guide to Modeling, Verification, and Applications, Springer-Verlag New York, 2001
  • [10]M Nyanchama, S Osborn. The role-graph model and conflict of interest, ACM Transactions on Information and System Security, 2(1999), No.1,3-33
  • [11]Reinhardt A. Botha, Jan H. P. Eloff. Separation of duties for access control enforcement in workflow environments, IBM Systems Journal, 40(2001), No.3, 666--682
  • [12]I. Ray and M. Toahchoodee. A spatio-temporal role-based access control model, Proceedings of the 21th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, 2007, 211--226
  • [13] Reinhardt A. Botha. CoSAWoE - A Model for Context-sensitive Access Control in Workflow Environments [D]:[PhD thesis]. South Africa: Johannesburg, 2001
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BPOH-0062-0017
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.