An Access Control Model for Organisational Management in Enterprise Architecture

被引:4
作者
Gaaloul, Khaled [1 ]
Proper, H. A. [1 ]
机构
[1] Ctr Rech Publ Henri Tudor, Luxembourg, Luxembourg
来源
2013 NINTH INTERNATIONAL CONFERENCE ON SEMANTICS, KNOWLEDGE AND GRIDS (SKG) | 2013年
关键词
Enterprise architecture; Access control; Task; Authorisation; ArchiMate; RBAC;
D O I
10.1109/SKG.2013.12
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Enterprise architecture (EA) aims to provide management with appropriate indicators and controls to steer and model service-oriented enterprises. EA offers a suitable operating platform to support an organisation's future goals and the roadmap for moving towards this vision. Despite significant research interest in the domain, common enterprises architecture frameworks lack of access control mechanisms supporting security requirements within organisations. Security has become a matter of paramount concern when managing organisations resources such as stakeholders' authorisation or sensitive data. In this paper, we propose an innovative approach for managing organisational resources in enterprise architecture. In doing so, we reason about task-based resources in the EA language ArchiMate. The idea is to build a conceptual model supporting access control when modelling a business process (set of tasks) in ArchiMate. We then map the common concepts with the role-based access control model (RBAC) to specify the required authorisation policies as part of the security specifications and guidelines in EA. Finally, a case study illustration will be used for the evaluation as part of the research approach.
引用
收藏
页码:37 / 43
页数:7
相关论文
共 20 条
[1]  
[Anonymous], 2007, COBIT 4 1
[2]  
[Anonymous], 1999, WORKFLOW MANAGEMENT
[3]  
[Anonymous], 2005, 27002 ISOIEC
[4]  
[Anonymous], 2013, ENTERPRISE ENG SERIE
[5]   Separation of duties for access control enforcement in workflow environments [J].
Botha, RA ;
Eloff, JHP .
IBM SYSTEMS JOURNAL, 2001, 40 (03) :666-682
[6]  
Feltus C, 2012, PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, P12
[7]   Concepts for modeling enterprise architectures [J].
Jonkers, H ;
Lankhorst, M ;
Van Buuren, R ;
Hoppenbrouwers, S ;
Bonsangue, M ;
Van Der Torre, L .
INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS, 2004, 13 (03) :257-287
[8]  
Lankhorst MM, 2009, LECT NOTES BUS INF P, V29, P367
[9]  
Moses Tim., 2005, EXTENSIBLE ACCESS CO
[10]   The PROMPT suite: interactive tools for ontology merging and mapping [J].
Noy, NF ;
Musen, MA .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2003, 59 (06) :983-1024