期刊文献+

带时间约束和角色控制的工作流系统授权模型 被引量:5

A WFMS authorization model with time constraints and role control
下载PDF
导出
摘要 分析传统RBAC授权模型直接用于工作流系统授权的不足之处,分析了传统授权模型对时间约束和责任分离约束支持的不足.构建了一个带有时间约束的基于角色的工作流系统授权模型,分析该模型对最小权限和责任分离要求的满足情况. Analyzes the deficiencies when traditional RBAC authorization model is directly used as workflow authorization one and its shortages to support time constraints and duty separation one. And a WFMS authorization model based on role control and time constraints is constructed, and how it meets the desires of least privilege and separation of duty is discussed.
出处 《山东大学学报(工学版)》 CAS 2006年第3期39-42,50,共5页 Journal of Shandong University(Engineering Science)
基金 国家863高技术研究发展项目基金(2003AA141120)
关键词 工作流 RBAC 授权 访问控制 时间约束 最小权限 责任分离 worldlow RBAC authorization access control time constrains least privilege duty separation
  • 相关文献

参考文献7

  • 1WU Sheng-li, SHETH A, MILLER J, et al. Authorization and access control of application data in woddlow system[J]. Journal of Intelligent Information System, 2002,18( 1 ) : 71-94. 被引量:1
  • 2SANDHU R, FERRAIOLO D, KUHN R. Proposed NIST standard for role-based access control[J]. ACM Transactions on Information and System Security, 2001, 4(3):224-274. 被引量:1
  • 3TC00-1003, Workflow management coalition the workflow reference model[S]. 被引量:1
  • 4BERTINO E, BETTINI C, FERRARI E, et al. A temporal access control mechanism for database systems[J]. IEEE Transactions on Knowledge and Data Engineering, 1996, 8( 1 ) : 67-80. 被引量:1
  • 5ATLURI V, HUANG Wei-kuang. An authorization model for workflows[A]. ELISA Bertino. Proceedings of the Fourth European Symposium on Research in Computer Security and Lecture Notes in Computer Science[C]. Berlin: Springer-Verlag,1996. 44-64. 被引量:1
  • 6BERTINO E, FERRARI E, ATLURI V. An approach for the specification and enforcement of authorization constraints in workflow management systems[J]. AC.M Transactions on Information Systems Security, 1999, 2(1):65-104. 被引量:1
  • 7BERTINO E, FERRARI E, BONATTI P A. TRBAC: A temporal role-based access control model[J]. ACM Transactions on Information and System Security, 2001, 4(3) : 191-223. 被引量:1

同被引文献61

引证文献5

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部