Modeling Context-Aware RBAC Models for Business Processes in Ubiquitous Computing Environments

被引:7
作者
Schefer-Wenzl, Sigrid [1 ]
Strembeck, Mark [1 ]
机构
[1] Vienna Univ Econ & Business WU Vienna, Inst Informat Syst & New Media, Vienna, Austria
来源
2012 THIRD FTRA INTERNATIONAL CONFERENCE ON MOBILE, UBIQUITOUS, AND INTELLIGENT COMPUTING (MUSIC) | 2012年
关键词
access control; business process modeling; context constraints; UML;
D O I
10.1109/MUSIC.2012.29
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With ubiquitous computing technologies, business processes become more mobile and distributed and are executed in varying contexts. Context-aware access control mechanisms are an important prerequisite to protect sensitive data and services in secure ubiquitous computing environments. In an IT-supported workflow, process-related context constraints are a means to consider context information in access control decisions. A context constraint specifies that certain conditions must be fulfilled to permit the execution of a particular task. However, standard process modeling languages do not support the notion of context constraints in business processes. In this paper, we integrate context constraints with process-related role-based access control (RBAC) models and thereby support context-dependent task execution.
引用
收藏
页码:126 / 131
页数:6
相关论文
共 27 条
  • [1] ADAM NR, 1998, J INTELLIGENT INFORM, V10
  • [2] [Anonymous], 2008, International Journal of Business Process Integration and Management
  • [3] [Anonymous], UN MOD LANG OMG UML
  • [4] [Anonymous], BUS PROC MOD NOT BPM
  • [5] Becker J., 2000, Business Process Management. Models, Techniques
  • [6] BERTINO E, 2001, ACM T INFORM SYSTEM, V4
  • [7] BERTINO E, 2005, P 10 ACM S ACC CONTR
  • [8] Corradi A., 2004, P NETW COMP APPL NCA
  • [9] CORTADELLA J, 1998, IEEE T COMPUTERS, V47
  • [10] Cuppens F., 2008, INT J INFORM SECURIT, V7