Supporting delegation in secure workflow management systems

被引:0
|
作者
Atluri, V [1 ]
Bertino, E [1 ]
Ferrari, E [1 ]
Mazzoleni, P [1 ]
机构
[1] Rutgers State Univ, MSIS Dept, Piscataway, NJ 08855 USA
来源
DATA AND APPLICATIONS SECURITY XVII: STATUS AND PROSPECTS | 2004年 / 142卷
关键词
access control; workflow systems; delegation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Workflow systems are today used in numerous business application domains including office automation, finance and banking, as well as in scientific application domains, for automating their day-to-day applications, Often, organizations establish a set of security policies that regulate how the business process and resources should be managed. For reasons of ease in management, these security policies are expressed in terms of roles. In addition to simple authorization rules specifying which subject/role can execute a task in a workflow, many business processes require support for more complex authorization constraints, such as separation of duties. In this paper, we present an approach that supports delegation and assign users to roles in such a way that no constraints are violated. In particular, we introduce the notion of delegation consistency and propose algorithms to assign tasks to users such that they guarantee delegation consistency.
引用
收藏
页码:190 / 202
页数:13
相关论文
共 50 条
  • [1] Injecting formulized delegation constraints into secure workflow systems
    Zhao, Li
    Li, Qing
    Wu, Guoqing
    PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, 2008, : 370 - +
  • [2] Delegation and Satisfiability in Workflow Systems
    Crampton, Jason
    Khambhammettu, Hemanth
    SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 31 - 40
  • [3] Secure Internet management by delegation
    Schönwälder, J
    Quittek, J
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2001, 35 (01): : 39 - 56
  • [4] Teleworkflow: Supporting remote control with workflow management systems
    Limburg, Diana
    Jackson, Paul J.
    NEW TECHNOLOGY WORK AND EMPLOYMENT, 2007, 22 (02) : 146 - 167
  • [5] Delegation Security Analysis in Workflow Systems
    Yang, Benyuan
    Hu, Hesuan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (01) : 229 - 240
  • [6] Controlled Delegation of Signature in Workflow Systems
    Fazlagic, Samir
    Behlilovic, Narcis
    Mrdovic, Sasa
    2012 20TH TELECOMMUNICATIONS FORUM (TELFOR), 2012, : 1389 - 1392
  • [7] Injecting a Permission-based Delegation Model to Secure Web-based Workflow Systems
    Wang, Xiaoran
    Bayrak, Coskun
    ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 101 - 106
  • [8] Supporting Effective Unexpected Exceptions Handling in Workflow Management Systems
    Mourao, Hernani
    Antunes, Pedro
    APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 1242 - +
  • [9] Supporting secure and transparent delegation in the CORBA proxy platform π2
    Nochta, Z
    Ruggaber, R
    Rochaeli, T
    EMERGING PERSONAL WIRELESS COMMUNICATIONS, 2001, 67 : 271 - 283
  • [10] Secure management by delegation within the Internet Management Framework
    Schönwälder, J
    Quittek, J
    INTEGRATED NETWORK MANAGEMENT VI: DISTRIBUTED MANAGEMENT FOR THE NETWORKED MILLENNIUM, 1999, : 687 - 700