메뉴 건너뛰기




Volumn 32, Issue 3, 2007, Pages 365-384

DW-RBAC: A formal security model of delegation and revocation in workflow systems

Author keywords

Access control; Delegation; Role based access control; Security; Workflow

Indexed keywords

INFORMATION MANAGEMENT; MATHEMATICAL MODELS; SOCIETIES AND INSTITUTIONS; SPECIFICATIONS;

EID: 33751436350     PISSN: 03064379     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.is.2005.11.008     Document Type: Article
Times cited : (76)

References (33)
  • 2
    • 84892711302 scopus 로고    scopus 로고
    • E.S. Barka, R. Sandhu, Framework for role-based delegation models, in: 16th Annual Computer Security Applications Conference, December 2000. http://www.acsac.org/2000/abstracts/34.html.
  • 3
    • 33751425833 scopus 로고    scopus 로고
    • E.S. Barka, R. Sandhu, A role-based delegation model and some extensions, in: 23rd National Information Systems Security Conference, October 2000. http://csrc.nist.gov/nissc/2000/proceedings/papers/021.pdf.
  • 6
    • 0348209180 scopus 로고    scopus 로고
    • WRBAC-a workflow security model incorporating controlled overriding of constraints
    • Wainer J., Kumar A., and Barthelmess P. WRBAC-a workflow security model incorporating controlled overriding of constraints. Int. J. Coop. Inf. Syst. 12 4 (2003) 455-486
    • (2003) Int. J. Coop. Inf. Syst. , vol.12 , Issue.4 , pp. 455-486
    • Wainer, J.1    Kumar, A.2    Barthelmess, P.3
  • 8
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Bertino E., Ferrari E., and Atluri V. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2 1 (1999) 65-104
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 9
    • 0035676950 scopus 로고    scopus 로고
    • Dynamic work distribution in workflow management systems: how to balance quality and performance?
    • Kumar A., van der Aalst W.M.P., and Verbeek H.M.W. Dynamic work distribution in workflow management systems: how to balance quality and performance?. J. MIS 18 3 (2002) 157-193
    • (2002) J. MIS , vol.18 , Issue.3 , pp. 157-193
    • Kumar, A.1    van der Aalst, W.M.P.2    Verbeek, H.M.W.3
  • 10
    • 2442514401 scopus 로고    scopus 로고
    • Applying scheduling techniques to minimize the number of late jobs in workflow systems
    • ACM Press, New York, NY
    • G. Baggio, J. Wainer, and C. Ellis. Applying scheduling techniques to minimize the number of late jobs in workflow systems. SAC '04: Proceedings of the 2004 ACM symposium on Applied computing (2004), ACM Press, New York, NY 1396-1403
    • (2004) SAC '04: Proceedings of the 2004 ACM symposium on Applied computing , pp. 1396-1403
    • G. Baggio1    J. Wainer2    C. Ellis3
  • 11
    • 0008724838 scopus 로고    scopus 로고
    • An authorization model for temporal and derived data: securing information portals
    • V. Atluri, and A. Gal. An authorization model for temporal and derived data: securing information portals. ACM Trans. Inf. Syst. Secur. 5 1 (2002) 62-94
    • (2002) ACM Trans. Inf. Syst. Secur. , vol.5 , Issue.1 , pp. 62-94
    • V. Atluri1    A. Gal2
  • 12
    • 0242540371 scopus 로고    scopus 로고
    • X. Zhang, S. Oh, R. Sandhu, in: PBDM: a flexible delegation model in RBAC, SACMAT '03: Proceedings of the Eighth ACM symposium on Access Control Models and Technologies, ACM Press, New York, 2003, pp.149-157.
  • 13
    • 3042684910 scopus 로고    scopus 로고
    • A rule-based framework for role-based delegation and revocation
    • Zhang L., Ahn G.-J., and Chu B.-T. A rule-based framework for role-based delegation and revocation. ACM Trans. Inf. Syst. Secur. 6 3 (2003) 404-441
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , Issue.3 , pp. 404-441
    • Zhang, L.1    Ahn, G.-J.2    Chu, B.-T.3
  • 14
    • 84947436665 scopus 로고    scopus 로고
    • C. Ruan, V. Varadharajan, Resolving conflicts in authorization delegations, in: Seventh Australian Conference on Information Security and Privacy, Lecture Notes in Computer Science, vol. 2384, Springer, Berlin, 2002, pp.271-285.
  • 15
    • 84865788031 scopus 로고    scopus 로고
    • A model of oasis role-based access control and its support for active security
    • J. Bacon, K. Moody, and W. Yao. A model of oasis role-based access control and its support for active security. ACM Trans. Inf. Syst. Secur. 5 4 (2002) 492-540
    • (2002) ACM Trans. Inf. Syst. Secur. , vol.5 , Issue.4 , pp. 492-540
    • J. Bacon1    K. Moody2    W. Yao3
  • 16
    • 1642417532 scopus 로고    scopus 로고
    • J.S. Park, Y.L. Lee, H.H. Lee, B.N. Noh, A role-based delegation model using role hierarchy supporting restricted permission inheritance, in: Proceedings of the International Conference on Security and Management, SAM '03, 2003, CSREA Press, pp.294-302.
  • 18
    • 35248894984 scopus 로고    scopus 로고
    • W. Yao, Fidelis: a policy-driven trust management framework, in: Trust management, First International Conference, iTrust, Lecture Notes in Computer Science, vol. 2692, Springer, Berlin, 2003, pp.301-317.
  • 21
    • 0035594917 scopus 로고    scopus 로고
    • Managing workflow authorization constraints through active database technology
    • Castano S., Casati F., and Fugini M. Managing workflow authorization constraints through active database technology. Inf. Syst. Front. 3 3 (2001)
    • (2001) Inf. Syst. Front. , vol.3 , Issue.3
    • Castano, S.1    Casati, F.2    Fugini, M.3
  • 22
    • 84949747356 scopus 로고    scopus 로고
    • V. Atluri, W-K. Huang, An authorization model for workflows, in: Proceedings of the Fifth European Symposium on Research in Computer Security, Lecture Notes in Computer Science, vol. 1146, Springer, Berlin, 1996, pp.44-64.
  • 23
    • 0033685030 scopus 로고    scopus 로고
    • V. Atluri, W-K. Huang, A petri net based safety analysis of workflow authorization models, J. Comput. Secur. 8 (2/3) (1999).
  • 27
    • 0039372661 scopus 로고    scopus 로고
    • Viewing business-process security from different perspectives
    • Herrmann G., and Pernul G. Viewing business-process security from different perspectives. Int. J. Electron. Commer. 3 3 (1999) 89-103
    • (1999) Int. J. Electron. Commer. , vol.3 , Issue.3 , pp. 89-103
    • Herrmann, G.1    Pernul, G.2
  • 29
    • 33751424000 scopus 로고    scopus 로고
    • J.A. Miller, M. Fan, S. Wu, I.B. Arpinar, A.P. Sheth, K.J. Kochut, Security for the meteor workflow management system, Uga-cs-lsdis Technical Report, University of Georgia, 1999.
  • 30
    • 33751412959 scopus 로고    scopus 로고
    • S. Wu, Task and role combined access control model for workflow system, Uga-lsdis, University of Georgia, 1999.
  • 31
    • 0033650839 scopus 로고    scopus 로고
    • G.-J. Ahn, R. Sandhu, M.H. Kang, J.S. Park, Injecting RBAC to secure a web-based workflow system, in: Fifth ACM Workshop on Role-Based Access Control, Berlin, Germany, July 2000. http://citeseer.nj.nec.com/ahn00injecting.html.
  • 33
    • 33751423258 scopus 로고    scopus 로고
    • V. Atluri, E. Bertino, E. Ferrari, P. Mazzoleni, Supporting delegation in secure workflow management systems, in: IFIP WG 11.3 Conference on Data and Application Security, 2003.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.