Security Workflow with Schematic Protection Model

Article Preview

Abstract:

Application of Schematic Protection Model (SPM) on workflow access control is studied. Fine grained access control properties of SPM made it feasible to express workflow security policies. SPM link predicate semantics is extended in the workflow context. Link predicate between workflow activities is applied to constrain the take grant enforcement. License access control in the workflow is also modeled by SPM Inner control ticket.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

824-827

Citation:

Online since:

September 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] P. Wicklund, SharePoint 2010 Workflows in Action: Manning, (2011).

Google Scholar

[2] R. S. Sandhu and P. Samarati, Access control: principle and practice, Communications Magazine, IEEE, vol. 32, pp.40-48, (1994).

DOI: 10.1109/35.312842

Google Scholar

[3] M. A. Harrison, W. L. Ruzzo, and J. D. Ullman, Protection in Operating System, Communications of ACM, vol. 19, pp.11-15, (1976).

Google Scholar

[4] R. K. Thomas and R. S. Sandhu, Task-based Authorization Controls ( TBAC ): A Family of Models for Active and Enterprise-oriented Authorization Management, presented at the Database Security, (1997).

DOI: 10.1007/978-0-387-35285-5_10

Google Scholar

[5] R. S. Sandhu, Expressive Power of the Schematic Protection Model, Journal of Computer Security, vol. 1, pp.188-193, (1998).

Google Scholar

[6] R. S. Sandhu, The Schematic Protection Model: Its Definition and Analysis for Acylic Attenuating Schemes, Journal of Association for Computing Machinary, vol. 35, pp.404-432, (1988).

DOI: 10.1145/42282.42286

Google Scholar

[7] W. v. d. Aalst and K. v. Hee, Workflow Management Models, Methods and Systems: MIT Press, (2000).

Google Scholar