Attribute and task based access control model for product development workflow

被引:0
作者
Li, Yang [1 ]
Liu, Geng [1 ]
Wang, Haiwei [1 ]
Han, Bing [1 ]
机构
[1] Shaanxi Engineering Laboratory for Transmissions and Controls, Northwestern Polytechnical University, Xi'an
来源
Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS | 2015年 / 21卷 / 12期
关键词
Access control; Attributes; Product development workflow; Task-step;
D O I
10.13196/j.cims.2015.12.004
中图分类号
学科分类号
摘要
To satisfy the requirements of permission assignment and utilization in product development workflow, the attribute concept was taken as the base to define, assign and use permissions mapping to tasks in workflow. Followed by the definition of attribute in access control area and the summarization of properties of attribute, an attribute and task based access control model was presented, which included two important elements of process and task-step. A process on behalf of a user's work was taken as the direct subject of execute access, and a task-step concept included the information of task and its state was introduced to make the associated task-step matching be the prerequisite of permission use, which could use permissions in certain works for associating with tasks. A component named as obligation was defined for the implement mechanism to support some dynamic policies in permission administration. The application showed that the proposed model enhanced the control on permission utilizations and suited for access control in workflow for product development. © 2015, CIMS. All right reserved.
引用
收藏
页码:3127 / 3134
页数:7
相关论文
共 14 条
  • [1] Li F., Su M., Shi G., Et al., Research status and development trends of access control model, Acta Electronica Sinica, 40, 4, pp. 805-813, (2012)
  • [2] Deng J., Hong F., Task-based access control model, Journal of Software, 14, 1, pp. 76-82, (2003)
  • [3] Thomas R.K., Sandhu R.S., Task-based authorization controls: A family of models for active and enterprise-oriented authorization management, Proceedings of the IFIP WG11.3 Workshop on Database Security, (1997)
  • [4] Liao X., Zhang L., Access control model for workflow management system for PLM, Computer Integrated Manufacturing Systems, 11, 10, pp. 1367-1371, (2005)
  • [5] Yin J., Xu Z., Feng Z., Et al., Task-based access control model supported by enhanced permission constraints, Journal of Computer Aided Design & Computer Graphics, 18, 1, pp. 143-149, (2006)
  • [6] Wei Y., Wang C., Luo X., Access control model based on graph for workflow, Computer Integrated Manufacturing Systems, 15, 5, pp. 925-931, (2009)
  • [7] Zhai Z., Xi J., Lu Y., Et al., An access control model with task-state sensitivity and its CPN simulation, Journal of Xi'an Jiaotong University, 46, 12, pp. 85-91, (2012)
  • [8] Zhai Z.N., Lu Y.H., Zhang P.J., Et al., Association-based active access control models with balanced scalability and flexibility, Computers in Industry, 65, 1, pp. 116-123, (2014)
  • [9] Wang X., Fu H., Zhang L., Research progress on attribute-based access control, Acta Electronica Sinica, 38, 7, pp. 1660-1667, (2010)
  • [10] Jin X., Krishnan R., Sandhu R., A unified attribute-based access control model covering DAC, MAC and RBAC, Proceedings of the 26th Annual IFIP WG11.3 Conference on Data and Applications Security and Privacy, (2012)