Font Size: a A A

Research On The Task Status-based Access Control Model Of Workflow And Its Application

Posted on:2007-04-15Degree:MasterType:Thesis
Country:ChinaCandidate:J H HuangFull Text:PDF
GTID:2178360242961868Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Workflow is a technology to use the computer to process whole or part of application automatically in organization system and lead to significant increases in processing performance and efficiency. Using internet technology it has been applied in business, assurance, bank and administration management. At the same time, more and more attentions are paid to system security.In the traditional access control models, Discretionary Access Control (DAC) is too dispersive in resource management, Mandatory Access Control (MAC) is short of integrality control; Role-based Access Control (RBAC) can't authorize privilege dynamically, and in Task-based Access Control (TBAC) the authorization is too complex, therefore, a Task Status-based Access (TSBAC) model is presented.In TSBAC, the role is used and based on the status of the task, the relationship between the roles and tasks, the tasks and status, and the status and privilege are all depicted with the two-dimensional matrix, then use the tables of database to depict these relationships and using joint operation to calculate the relationship of the role, task and privilege, it's more easily and clearly to depict the relationship of the role, task and privilege. This model can dynamically distribute the privilege and improve the security of the data access.Task Status-based Access Control in web environment combines the merit of web system and the security of Task Status-based Access Control. So it has wide future in web application.The Security system of the Rhombus sale management information system is a Task Status-based Access Control system. Base the requirement of the client to design a rational framework of the access control system. And the relationship between access control system and business application system should also be thought over. To select the suitable access control granularity is the key to design the security system.
Keywords/Search Tags:Web service, Access control, Task status, Role
PDF Full Text Request
Related items