Context-sensitive Access Control Model for Business Processes

被引:8
作者
Sladic, Goran [1 ]
Milosavljevic, Branko [1 ]
Konjovic, Zora [1 ]
机构
[1] Univ Novi Sad, Fac Tech Sci, Novi Sad 21000, Serbia
关键词
access control; RBAC; context-sensitive; workflow; business process; CONTROL FRAMEWORK; RBAC;
D O I
10.2298/CSIS110907042S
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper focuses on problems of access control for business processes. The subject of the paper is a specification of the Context-sensitive access control model for business processes (COBAC). In order to efficiently define and enforce access control for different business processes, the COBAC model is based on the RBAC (Role-based Access Control) model which is extended with the following entities: context, business process, activity and resource category. By using a context-sensitive access control it is possible to define more complex access control policies whose implementation by existing access control models for business processes is not possible or is very complicated. The COBAC's context model can describe rich context information and can be easily extended for specific cases. The introduction of business process and activity entities has facilitated the definition of access control policies for business processes. The categorization of resources enables the definition of access control policies for whole resource categories, and thus, potentially, reduces the number of policies which need to be defined. The COBAC model is applicable in different business information systems, and supports the definition of access control policies for both simple and complex business processes. The model is verified by a case study on a real business process.
引用
收藏
页码:939 / 972
页数:34
相关论文
共 56 条
[1]  
Abowd G. D., 2002, IEEE Pervasive Computing, V1, P48, DOI 10.1109/MPRV.2002.993144
[2]  
Abowd GD, 1999, LECT NOTES COMPUT SC, V1707, P304
[3]  
[Anonymous], 2001, 6 ACM S ACCESS CONTR
[4]  
[Anonymous], 2004, a W3C Recommendation
[5]  
[Anonymous], 1994, 1994 1 WORKSH MOB C, DOI [10.1109/WMCSA.1994.16, DOI 10.1109/WMCSA.1994.16]
[6]  
[Anonymous], 2011, P 3 ACM SIGPLAN WORK
[7]  
Bao YB, 2008, PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, P1175, DOI 10.1109/ICYCS.2008.528
[8]  
Bertino E., 2001, ACM Transactions on Information and Systems Security, V4, P191, DOI 10.1145/501978.501979
[9]  
Bertino Elisa., 2005, SACMAT 05, P29
[10]   A trust-based context-aware access control model for Web-services [J].
Bhatti, R ;
Bertino, E ;
Ghafoor, A .
DISTRIBUTED AND PARALLEL DATABASES, 2005, 18 (01) :83-105