Paper
19 November 2007 An access control model with high security for distributed workflow and real-time application
Ruo-Fei Han, Hou-Xiang Wang
Author Affiliations +
Proceedings Volume 6784, Network Architectures, Management, and Applications V; 67843E (2007) https://doi.org/10.1117/12.742835
Event: Asia-Pacific Optical Communications, 2007, Wuhan, China
Abstract
The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.
© (2007) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Ruo-Fei Han and Hou-Xiang Wang "An access control model with high security for distributed workflow and real-time application", Proc. SPIE 6784, Network Architectures, Management, and Applications V, 67843E (19 November 2007); https://doi.org/10.1117/12.742835
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Control systems

Process modeling

Systems modeling

Distributed computing

Computer security

Defense and security

Back to Top