An approach for implementation of RBAC models with context constraint to business process systems

  • Authors:
  • Yi Guo;Myeonggil Choi;Sangmun Shin;Guibam Bae;Yongsun Choi

  • Affiliations:
  • Department of System Management & Engineering, Inje University, South Korea;Department of System Management & Engineering, Inje University, South Korea;Department of System Management & Engineering, Inje University, South Korea;Department of System Management & Engineering, Inje University, South Korea;Department of System Management & Engineering, Inje University, South Korea

  • Venue:
  • ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
  • Year:
  • 2006

Quantified Score

Hi-index 0.01

Visualization

Abstract

Business Process Management (BPM) System has recently been paid much attention because they can support dynamic business processes over heterogeneous computing systems. However, most BPM systems merely support fundamental security services at during run time, such as authentication of users and network security. Apparently, to satisfy the real-time systems security requirement, it is more effective and secure to consider security issues during the processes' build time. In this paper, we describe an approach to implement the RBAC models with context constraint for business process system. Specifically, we utilize the RBAC models with context constraint mechanism to meet our needs and describe the security architecture to be applied to a BPM system. The intention of this paper is to extend RBAC models with context constraints to fulfill the requirements of BPM systems with respect to security, flexibility and expansibility.