Supporting delegation in secure workflow management systems

被引:0
作者
Atluri, V [1 ]
Bertino, E [1 ]
Ferrari, E [1 ]
Mazzoleni, P [1 ]
机构
[1] Rutgers State Univ, MSIS Dept, Piscataway, NJ 08855 USA
来源
DATA AND APPLICATIONS SECURITY XVII: STATUS AND PROSPECTS | 2004年 / 142卷
关键词
access control; workflow systems; delegation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Workflow systems are today used in numerous business application domains including office automation, finance and banking, as well as in scientific application domains, for automating their day-to-day applications, Often, organizations establish a set of security policies that regulate how the business process and resources should be managed. For reasons of ease in management, these security policies are expressed in terms of roles. In addition to simple authorization rules specifying which subject/role can execute a task in a workflow, many business processes require support for more complex authorization constraints, such as separation of duties. In this paper, we present an approach that supports delegation and assign users to roles in such a way that no constraints are violated. In particular, we introduce the notion of delegation consistency and propose algorithms to assign tasks to users such that they guarantee delegation consistency.
引用
收藏
页码:190 / 202
页数:13
相关论文
共 50 条
[31]   SWARM: Reimagining scientific workflow management systems in a distributed world [J].
Balaprakash, Prasanna ;
Raghavan, Krishnan ;
Cappello, Franck ;
Deelman, Ewa ;
Mandal, Anirban ;
Jin, Hongwei ;
Mahmud, Imtiaz ;
Thareja, Komal ;
Wu, Shixun ;
Zuk, Pawel ;
Kiran, Mariam ;
Chen, Zizhong ;
Di, Sheng ;
Wu, Kesheng .
INTERNATIONAL JOURNAL OF HIGH PERFORMANCE COMPUTING APPLICATIONS, 2025,
[32]   A Model for Constraint and Delegation Management [J].
Pham, Quan ;
Reid, Jason ;
Dawson, Ed .
INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 :362-371
[33]   Secure information sharing using role-based delegation [J].
Ahn, GJ ;
Mohan, B .
ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, :810-815
[34]   Towards secure delegation with Chinese wall security policy (CWSP) [J].
Ye C. ;
Hu H. ;
Xiang H. .
Journal of Networks, 2011, 6 (08) :1230-1237
[35]   Secure role-based workflow models [J].
Kandala, S ;
Sandhu, R .
DATABASE AND APPLICATION SECURITY XV, 2002, 87 :45-58
[36]   A role-based delegation model using role hierarchy supporting restricted permission inheritance [J].
Park, JS ;
Lee, YL ;
Lee, HH ;
Noh, BN .
SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, :294-299
[37]   ATTRIBUTE-BASED DELEGATION IN PRIVILEGE MANAGEMENT OF PDM SYSTEM [J].
Ye, Chunxiao ;
Fu, Yunqing .
JOURNAL OF ADVANCED MANUFACTURING SYSTEMS, 2008, 7 (02) :303-306
[39]   Reasoning about delegation and account access in retail payment systems [J].
Chin, Shiu-Kai ;
Older, Susan .
COMPUTER NETWORK SECURITY, PROCEEDINGS, 2007, 1 :99-+
[40]   Workflow-based Collaborative Decision Support for Flood Management Systems [J].
Ivanov, Sergey V. ;
Kovalchuk, Sergey V. ;
Boukhanovsky, Alexander V. .
2013 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE, 2013, 18 :2213-2222