期刊文献+

一种含工作流Web信息系统的访问控制模型设计实现 被引量:1

Design and Implementation of Access Control Model in Web Infonnation System with Workflow
下载PDF
导出
摘要 包含工作流的Web信息系统是目前较为流行的一种系统应用模式。针对现有TRBAC模型在此类系统应用中存在的控制数据冗余、效率低下等不足改进提出了一种新的访问控制模型,该模型将RBAC与TRBAC进行结合,并按操作级别对角色与权限进行划分,通过引入流程历史信息等约束条件实现动态授权中操作权限与执行上下文的紧密关联,较好地实现了动、静态授权的分离,在保证系统安全的同时降低了访问控制策略的复杂度,为此类系统访问控制策略的制定提供了一个基本的参考性框架。最后以基于Web的办公自动化系统为例描述了模型在应用中的实现方案。 Web Information System with workflow is a prevalent mode of system application. In allusion to the deficiencies of applying TRBAC model in such a kind of system which includes redundancy control data and low efficiency, this article puts forward an improved access control model. The model integrates RBAC and TRBAC, partitioning roles and permissions by the level of operation. In the dynamic authorization, operating permissions and function contexts are related by constraints with history information. By applying this model, the static authorization and the dynamic authorization are separated effectivdy, the complexity of access control strategy is lowered when the security is ensured, and a reference frame is provided. In the end, an implementation of the model in Web OA is described as an example.
作者 王江 李中学
出处 《后勤工程学院学报》 2006年第3期49-52,56,共5页 Journal of Logistical Engineering University
关键词 WEB信息系统 工作流 访问控制模型 动态授权 Web Information System workflow access control model dynamic authorization
  • 相关文献

参考文献10

二级参考文献36

  • 1[1]REINHARDT AB,et al. Access Control in Document-centric Workflow System:An Agent-based Approach[J].Computers and Security,2001,20(6): 525-532.
  • 2[2]FERRAIOLO DF,BARKLY JF,KUHN DR.A Role Based Access Control Model and Reference Implement Within a Corporate Intranet[J].ACM Transactions on Information Systems Security,1999,2(1).
  • 3[3]SANDHU R,COYNE EJ.Role-Based Access Control Models[J].IEEE Computer,1996,29(2):38-47.
  • 4[4]SANDHU RS,MUNAWER Q.The ARABC99 Model for Administration of Role[J].ACM Transactions on Information and System Security,1999,6(2): 65-79.
  • 5[5]REINHARDT AB,et al.Access Control in Document-centric Workflow Systems:An Agent-based Approach[J].Computers and Security,2001,20(6): 525-532.
  • 6Ravi S Sandhu, Edward J Coyne, Hal L Feinstein, Charles E Youman. Role-based access control models[ J ]. IEEE. Computer, 1996,29(2).
  • 7Matunda Nyanchama, Sylvia Osborn. Access rights administration in role-based security system[A] .IN J Biskup,M Morgenstem, C E l.andwehr. Database Security VIII: Stares & Prospects[C]. North-Holland: Elsevier,August 1994.37-56.
  • 8Ferraiolo D, Cugini J, Kuhn R. Role-based access control(RBAC) : features and motivations[ A ]. Proc. of 11th Annual Computer Security Application Conference[ C ]. New Orleans,LA, 1995.
  • 9WFMC.TC00-1019:Workflow Management Coalition Workflow Security Considerations White Paper.1998.
  • 10Ravi S Sandhu et al.Role-based Access Control Models[J].IEEE Computer, 1996; 38-47.

共引文献173

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部