期刊文献+

SaaS工作流访问控制模型设计 被引量:2

Designing a SaaS workflow access control model
下载PDF
导出
摘要 在SaaS中,人们正逐渐采用基于服务的业务流程来满足企业业务流程的灵活性和定制性。从实现工作流访问控制的角度,应当使工作流访问控制模型与流程模型分离,以支持在流程改变或组织机构变化时减少对彼此的影响。为此,设计和实现了一个面向服务的、支持访问控制模型和流程模型分离的SaaS工作流访问控制模型—RBSWAC(Role-based Service Workflow Accesss Control)。该模型可提高访问控制的适应性和灵活性,实现访问控制模型同流程模型的松耦合和灵活性。 Service oriented workflow has been adopted in the SaaS application to meet the flexibility and customization of enterprise information system, which emphasizes the separation of access control model and the workflow model. In this paper the authors design and implement a service oriented SaaS workflow access control model-RBSWAC(or Role-based Service Worklfow Accesss Control), which may enhance the flexibility and adaptability of access control and realize the loose coupling and agileness between the access control model and the workflow model.
出处 《计算机时代》 2012年第3期12-14,共3页 Computer Era
关键词 SAAS 访问控制模型 服务 工作流 SaaS access control model service workflow
  • 相关文献

参考文献6

二级参考文献18

  • 1D Ferraiolo, J Cugini, D R Kuhn. Role based access control:Features and motivations. In: Proc of the llth Annual Computer Security Applications Conf. Los Alamitos, CA: IEEE Computer Society Press, 1995. 被引量:1
  • 2D Ferraiolo, J Barkley, D R Kuhn. A role-based access control model and reference implementation within a corporate Intranet ACM Trans on Information and System Security, 1999, 2( 1 ) : 34-64. 被引量:1
  • 3R Sandhu, E Coyne, H Feinstein et al. Role-based access control models. IEEE Computers, 1996, 29(2) : 38-47. 被引量:1
  • 4D Ferraiolo, R Sandhu, D R Kuhn et al. Proposed NIST standard for role-based access control. ACM Trans on Information and System Security, 2001, 4(3): 224-274. 被引量:1
  • 5G Ahn, R Sandhu. Role-based authorization constraints specification. ACM Trans on Information and System Security,2000, 3(4): 207-226. 被引量:1
  • 6P Iglio, L Giuri. A formal model for role-based access control with constraints. In: Proc of the 9th IEEE Workshop on Computer Security Foundations. Los Alamitos, CA: IEEE Press, 1996.136- 145. 被引量:1
  • 7D Gligor, S Gavrila, D Ferraiolo. On the formal definition of separation-of-duty policies and their composition. In: Proc of the 1998 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press,1998. 172- 183. 被引量:1
  • 8R Sandhu, D Ferraiolo, R Kuhn. The NIST model for role based access control: Towards a unified standard. In: Proc of the 5th ACM Workshop on Role Based Access Control. New York, NY:ACM Press, 2000. 47-63. 被引量:1
  • 9J M Spivey. The Z Notation: A Reference Manual, Seamd Edition. New Jersey, USA: Prentice Hall, 1992. 被引量:1
  • 10Manuel Koch, Luigi V Mancini, Francesco Parisi-Presicce. A formal model for role-based access control using graph transformations. In: The 6th European Symp on Research in Computer Security (ESORICS 2000) . Berlin: Springer, 2000.122- 139. 被引量:1

共引文献44

同被引文献16

  • 1孟健,曹立明,王小平,姚亮.XML文档的加密访问控制与传输[J].计算机应用,2006,26(5):1061-1063. 被引量:7
  • 2李瑞轩,赵战西,文坤梅,孙小林,王治纲.基于本体的多域访问控制策略集成研究[J].小型微型计算机系统,2007,28(9):1710-1714. 被引量:9
  • 3Ju J,Wang Y,Fu J,et al.Research on key technology in Saa S[C]//Intelligent Computing and Cognitive Informatics(ICICCI),2010 International Conference on.IEEE,2010:384-387. 被引量:1
  • 4Demchenko Y,Ngo C,de Laat C.Access control infrastructure for ondemand provisioned virtualised infrastructure services[C]//Collaboration Technologies and Systems(CTS),2011 International Conference on.IEEE,2011:466-475. 被引量:1
  • 5Li J,Zhao G,Chen X,et al.Fine-grained data access control systems with user accountability in cloud computing[C]//Cloud Computing Technology and Science(Cloud Com),2010 IEEE Second International Conference on.IEEE,2010:89-96. 被引量:1
  • 6Jensen M,Schage S,Schwenk J.Towards an anonymous access control and accountability scheme for cloud computing[C]//Cloud Computing(CLOUD),2010 IEEE 3rd International Conference on.IEEE,2010:540-541. 被引量:1
  • 7Luo S X,Liu F M,Ren C L.A hierarchy attribute-based access control model for cloud storage[C]//Machine Learning and Cybernetics(ICMLC),2011 International Conference on.IEEE,2011,3:1146-1150. 被引量:1
  • 8Tang Y,Lee P,Lui J,et al.Secure overlay cloud storage with access control and assured deletion[J].IEEE Transaction on dependable and secure computing,2012,9(6):903-916. 被引量:1
  • 9张光辉,韩进,谢俊元.基于角色映射和PBNM的多域安全访问控制模型[J].计算机应用研究,2008,25(3):888-890. 被引量:5
  • 10马立林,李红.基于RBAC的SaaS系统的权限模型[J].计算机应用与软件,2010,27(4):42-44. 被引量:13

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部