A Location-Aware Access Control Model for Mobile Workflow Systems

被引:3
作者
Decker, Michael [1 ]
机构
[1] Univ Karlsruhe, Mobile Business Res Grp, Inst Appl Informat & Formal Descript Methods AIFB, TH, Karlsruhe, Germany
关键词
Access Control; Location-Aware Computing; Mobile Workflow Systems; Security Model;
D O I
10.4018/jitwe.2009010104
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Workflow management systems (WfMS) are a special class of information systems (IS) that support the automated enactment of business processes. Meanwhile there are WfMS which allow the execution of tasks using mobile computers like PDA with the ability of wireless data transmission. However, the employment of workflow systems as well as mobile technologies comes along with special security challenges. One way to tackle these challenges is the employment of so locationaware access control to enforce rules that describe from which locations a user is allowed to perform which activities. The data model behind access control in termed access control model (ACM). There are special ACM for mobile information systems (IS) as well as for WfMS but no one that addresses mobile as well as workflow specific aspects. In the article we therefore discuss the specific constraints such a model should be able to express and introduce an appropriate ACM.
引用
收藏
页码:50 / 66
页数:17
相关论文
共 26 条
[1]   Exotica/FMDC: A workflow management system for mobile and disconnected clients [J].
Alonso, G ;
Gunthor, R ;
Kamath, M ;
Agrawal, D ;
ElAbbadi, A ;
Mohan, C .
DISTRIBUTED AND PARALLEL DATABASES, 1996, 4 (03) :229-247
[2]  
Atluri V., 1996, Computer Security-ESORICS 96. 4th European Symposium on Research in Computer Security Proceedings, P44
[3]  
Benantar M., 2006, ACCESS CONTROL SYSTE
[4]  
BERTINO E, 1999, ACM T INFORM SYST SE, V2, P65, DOI DOI 10.1145/300830.300837
[5]  
Chandran SM, 2005, LECT NOTES COMPUT SC, V3806, P361
[6]  
Damiani M. L., 2007, International Journal of Information and Computer Security, V1, P5, DOI 10.1504/IJICS.2007.012243
[7]   Supporting mobile business workflow with Commune [J].
Davis, John ;
Sow, Daby ;
Bourges-Waldegg, Daniela ;
Guo, Chang Jie ;
Hoertnagl, Christian ;
Stolze, Markus ;
Eagle, Brian White ;
Yin, Ying .
SEVENTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS & APPLICATIONS, PROCEEDINGS, 2006, :10-15
[8]  
Decker M., 2008, P INT C MOB BUS ICMB
[9]  
Denning D. E., 1996, Computer Fraud & Security, P12, DOI 10.1016/S1361-3723(97)82613-9
[10]  
DENNING DE, 1979, COMPUT SURV, V11, P227, DOI 10.1145/356778.356782