会议专题

JBPW Workflow Model Basing on Security Access Control Strategies

After analyzing the security requirements of the workflow access control, this research proposed a workflow authorization model, which characterized as follow: the role and authority are not directly linked but connected through tasks, and then assign users the appropriate roles, and gain the access authority and perform the task by certain roles, and while performing a task in a specific instance, getting the access permissions to the task object Compared with most of other current models, workflow access control model based on role and task achieves separation of duties, and thus allow more convenient for the control and management of granular permission, but also provides a guarantee for the security access.

workflow access control JBPM

Beiming Yu Xiaoqiong Lin Jingsha He Yuqiang Zhang

School of Software Engineering Beijing University of Technology Beijing 100124, China

国际会议

2011 3rd International Conference on Computer and Network Technology(ICCNT 2011)(2011第三届IEEE计算机与网络技术国际会议)

太原

英文

633-635

2011-02-26(万方平台首次上网日期,不代表论文的发表时间)