DocumentCode :
2350564
Title :
Injecting formulized delegation constraints into secure workflow systems
Author :
Zhao, Li ; Li, Qing ; Wu, Guoqing
Author_Institution :
School of Computer, Wuhan University, Hubei, China
fYear :
2008
fDate :
13-15 July 2008
Firstpage :
370
Lastpage :
373
Abstract :
In a secure workflow system, it is imperative to specify which users (or roles) can be authorized to execute which specific tasks. Users may also be able to delegate their rights of executing a task to others. Much of research work in the area of delegation has been carried out. In this paper, we provide a new formal method for representing delegation constraints in secure workflow systems, by adding a trust relationship and propagation parameters to make delegation propagation more effective. We also analyze the consistency after the delegation constraints are injected into the secure workflow systems.
Keywords :
Access control; Authorization; Computer science; Control systems; Permission; Qualifications; Security; Workflow management software;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Reuse and Integration, 2008. IRI 2008. IEEE International Conference on
Conference_Location :
Las Vegas, NV, USA
Print_ISBN :
978-1-4244-2659-1
Electronic_ISBN :
978-1-4244-2660-7
Type :
conf
DOI :
10.1109/IRI.2008.4583059
Filename :
4583059
Link To Document :
بازگشت