Database security
An overview of workflow management: from process modeling to workflow automation infrastructure
Distributed and Parallel Databases - Special issue on software support for work flow management
Role-Based Access Control Models
Computer
ACM Computing Surveys (CSUR)
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
An extended Petri net model for supporting workflow in a multilevel secure environment
Proceedings of the tenth annual IFIP TC11/WG11.3 international conference on Database security: volume X : status and prospects: status and prospects
Specification and implementation of exceptions in workflow management systems
ACM Transactions on Database Systems (TODS)
Enforcing workflow authorization constraints using triggers
Journal of Computer Security
Automated derivation of global authorizations for database federations
Journal of Computer Security - Special issue on database security
Principles of Database and Knowledge-Base Systems: Volume II: The New Technologies
Principles of Database and Knowledge-Base Systems: Volume II: The New Technologies
Database Support for Workflow Management: The Wide Project
Database Support for Workflow Management: The Wide Project
Using Patterns to Design Rules in Workflows
IEEE Transactions on Software Engineering
Deriving Production Rules for Incremental View Maintenance
VLDB '91 Proceedings of the 17th International Conference on Very Large Data Bases
An Algebraic Approach to Rule Analysis in Expert Database Systems
VLDB '94 Proceedings of the 20th International Conference on Very Large Data Bases
Integrating Triggers and Declarative Constraints in SQL Database Sytems
VLDB '96 Proceedings of the 22th International Conference on Very Large Data Bases
An Environment for Designing Exceptions in Workflows
CAiSE '98 Proceedings of the 10th International Conference on Advanced Information Systems Engineering
Authorization and Access Control of Application Data in Workflow Systems
Journal of Intelligent Information Systems - Special issue: A survey of research questions for intelligent information systems in education
A Uniform Model for Authorization and Access Control in Enterprise Information Platform
EDCIS '02 Proceedings of the First International Conference on Engineering and Deployment of Cooperative Information Systems
A methodology for developing trusted information systems: the security requirements analysis phase
Current security management & Ethical issues of information technology
A model of dynamic resource allocation in workflow systems
ADC '04 Proceedings of the 15th Australasian database conference - Volume 27
A reference monitor for workflow systems with constrained task execution
Proceedings of the tenth ACM symposium on Access control models and technologies
Key research issues in grid workflow verification and validation
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
A policy-based authorization model for workflow-enabled dynamic process management
Journal of Network and Computer Applications
The research and implementation of a new B/S access control
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
Dynamic change handling for inter-organisational workflows in open virtual eMarketplaces
International Journal of Intelligent Information and Database Systems
AWSM: Allocation of workflows utilizing social network metrics
Decision Support Systems
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems - Volume Part I
An approach for implementation of RBAC models with context constraint to business process systems
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Constraint-centric workflow change analytics
Decision Support Systems
OTM'11 Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems - Volume Part I
Balancing flexibility and security in adaptive process management systems
OTM'05 Proceedings of the 2005 Confederated international conference on On the Move to Meaningful Internet Systems - Volume >Part I
A task-oriented access control model for WfMS
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Optimistic anonymous participation in inter-organizational workflow instances
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Performance analysis for workflow management systems under role-based authorization control
GPC'12 Proceedings of the 7th international conference on Advances in Grid and Pervasive Computing
On the Prevention of Fraud and Privacy Exposure in Process Information Flow
INFORMS Journal on Computing
Information and Software Technology
Hi-index | 0.00 |
The execution of workflow processes requires authorizations for enforcing the assignment of tasks to agents, either human or automated, according to the security policy of the organization. This paper presents a workflow authorization framework based on roles and organizational levels, and on authorization constraints. To facilitate the assignment of tasks to agents, roles and organizational levels are organized into hierarchies. Authorization constraints are introduced to specify instance-dependent, time-dependent, and history-dependent authorizations. Authorization constraints are specified in terms of active rules, used also for authorization management. The Workflow Management System determines authorized agents on the basis of the contents of an authorization base maintained through the active rules defined in the system.