Managing heterogeneous multi-system tasks to support enterprise-wide operations
Distributed and Parallel Databases - Special issue on software support for work flow management
Role-Based Access Control Models
Computer
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Injecting RBAC to secure a Web-based workflow system
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Engineering authority and trust in cyberspace: the OM-AM and RBAC way
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Principles of Database and Knowledge-Base Systems: Volume II: The New Technologies
Principles of Database and Knowledge-Base Systems: Volume II: The New Technologies
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
Separation of Duty in Role-based Environments
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
A model of OASIS role-based access control and its support for active security
ACM Transactions on Information and System Security (TISSEC)
Model driven security for process-oriented systems
Proceedings of the eighth ACM symposium on Access control models and technologies
SOWAC: A Service-Oriented Workflow Access Control Model
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
A reference monitor for workflow systems with constrained task execution
Proceedings of the tenth ACM symposium on Access control models and technologies
Mobile-driven architecture for managing enterprise security policies
Proceedings of the 44th annual Southeast regional conference
On mutually exclusive roles and separation-of-duty
ACM Transactions on Information and System Security (TISSEC)
On delegation and workflow execution models
Proceedings of the 2008 ACM symposium on Applied computing
Delegation and satisfiability in workflow systems
Proceedings of the 13th ACM symposium on Access control models and technologies
Towards secure electronic workflows
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Information and Software Technology
Hi-index | 0.00 |
In this paper we introduce a series of reference models for Secure Role-Based Workflow systems. We build our models over the well-known RBAC96 framework. The RBAC96 model supports the notion of abstract permissions. The nature of permissions is highly dependent upon the implementation details of the system, so we interpret the permissions for a Workflow system in terms of its components such as tasks, instances of the tasks and operations on them like execute, commit, abort etc. With this interpretation, we show that most of the components of RBAC96 still remain intact. The only components that change are the nature of permissions and their assignment to roles. The models are developed using the recently introduced four-layer OM-AM framework (comprising objective, model, architecture and mechanism layers). In this paper, we focus on the top two layers of OM-AM. We systematically describe our security objectives and construct our models to address these objectives. We also formally describe the models in terms of their components and their interactions. The main purpose for proposing these models is to articulate requirements for building Secure Role-Based Workflow Systems.