Supporting delegation in secure workflow management systems

被引:0
作者
Atluri, V [1 ]
Bertino, E [1 ]
Ferrari, E [1 ]
Mazzoleni, P [1 ]
机构
[1] Rutgers State Univ, MSIS Dept, Piscataway, NJ 08855 USA
来源
DATA AND APPLICATIONS SECURITY XVII: STATUS AND PROSPECTS | 2004年 / 142卷
关键词
access control; workflow systems; delegation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Workflow systems are today used in numerous business application domains including office automation, finance and banking, as well as in scientific application domains, for automating their day-to-day applications, Often, organizations establish a set of security policies that regulate how the business process and resources should be managed. For reasons of ease in management, these security policies are expressed in terms of roles. In addition to simple authorization rules specifying which subject/role can execute a task in a workflow, many business processes require support for more complex authorization constraints, such as separation of duties. In this paper, we present an approach that supports delegation and assign users to roles in such a way that no constraints are violated. In particular, we introduce the notion of delegation consistency and propose algorithms to assign tasks to users such that they guarantee delegation consistency.
引用
收藏
页码:190 / 202
页数:13
相关论文
共 50 条
[41]   An Approach for Consistent Delegation in Process-Aware Information Systems [J].
Schefer-Wenzl, Sigrid ;
Strembeck, Mark ;
Baumgrass, Anne .
BUSINESS INFORMATION SYSTEMS, BIS 2012, 2012, 117 :60-71
[42]   DELEGATION AS MANAGEMENT TOOL IN PRIMARY SCHOOLS [J].
Makanatleng, Moses ;
White, Cornelius .
ICERI2016: 9TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION, 2016, :6516-6522
[43]   A Secure Delegation Model Based on Multi-agent in Pervasive Environments [J].
Kim, Kyu Il ;
Choi, Won Gil ;
Lee, Eun Ju ;
Kim, Ung Mo .
AGENT AND MULTI-AGENT SYSTEMS: TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2009, 5559 :304-313
[44]   Enhanced Delegation Based Authentication Protocol for Secure Roaming Service with Synchronization [J].
HsingBai Chen ;
YungHsiang Lai ;
KueiWan Chen ;
WeiBin Lee .
JournalofElectronicScienceandTechnology, 2011, 9 (04) :345-351
[45]   Towards secure information sharing using role-based delegation [J].
Ahn, Gall-Joon ;
Mohan, Badrinath ;
Hong, Seng-Phil .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) :42-59
[46]   Secure Abstraction Views for Scientific Workflow Provenance Querying [J].
Chebotko, Artem ;
Lu, Shiyong ;
Chang, Seunghan ;
Fotouhi, Farshad ;
Yang, Ping .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2010, 3 (04) :322-337
[47]   Verifying a delegation protocol for grid systems [J].
Aziz, Benjamin ;
Hamilton, Geoff .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2011, 27 (05) :476-485
[48]   Advances in Workflow Systems [J].
Chung, Paul Wai Hing .
COMPUTATIONAL INTELLIGENCE IN INFORMATION SYSTEMS, 2015, 331 :1-9
[49]   Implementing workflow systems [J].
Dreyer, L ;
Olivier, M .
RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY, 2003, 128 :61-72
[50]   Dynamic work distribution in workflow management systems: How to balance quality and performance [J].
Kumar, A ;
van der Aalst, WMP ;
Verbeek, EMW .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2001, 18 (03) :157-193