DocumentCode :
541945
Title :
Access control models for business processes
Author :
Karimi, Vahid R. ; Cowan, Donald D.
Author_Institution :
Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada
fYear :
2010
fDate :
26-28 July 2010
Firstpage :
1
Lastpage :
10
Abstract :
A business model describes certain operations of an enterprise, and an important aspect of business operations deals with the specification of access control policies, which are used to constrain the business operations by adding what should, could, or must be. We describe the use of patterns for presenting access control models and policies. Our goal is to specify access control policies such that they are based on access control models and have the capability of policy languages, thereby making the foundational blocks of these policies and operational models identical. Thus, the integration of these policies into operational models is straightforward. To show our approach, we use Role-based Access Control (RBAC), a well-known access control model, and also select a business process model whose foundational building blocks are Resources, Events, and Agents (REA). We make three main contributions: 1) the use of the same foundational building blocks and similar models to describe business processes and access control models, 2) access control policies that are based on an access control model, and 3) access control policies that are rule-based and akin to policy languages. As a result, such models are more understandable, and their future modifications are more straightforward.
Keywords :
Access control; Adaptation model; Business; Context; Customer service; Data models; Unified modeling language; Access control models and policies; Business processes; Patterns; RBAC; REA;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on
Conference_Location :
Athens
Type :
conf
Filename :
5741668
Link To Document :
بازگشت