• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
高级检索

业务流程授权约束依从性分析

薄阳, 夏春和

薄阳, 夏春和. 业务流程授权约束依从性分析[J]. 计算机研究与发展, 2017, 54(10): 2404-2418. DOI: 10.7544/issn1000-1239.2017.20170397
引用本文: 薄阳, 夏春和. 业务流程授权约束依从性分析[J]. 计算机研究与发展, 2017, 54(10): 2404-2418. DOI: 10.7544/issn1000-1239.2017.20170397
Bo Yang, Xia Chunhe. Compliance Analysis of Authorization Constraints in Business Process[J]. Journal of Computer Research and Development, 2017, 54(10): 2404-2418. DOI: 10.7544/issn1000-1239.2017.20170397
Citation: Bo Yang, Xia Chunhe. Compliance Analysis of Authorization Constraints in Business Process[J]. Journal of Computer Research and Development, 2017, 54(10): 2404-2418. DOI: 10.7544/issn1000-1239.2017.20170397
薄阳, 夏春和. 业务流程授权约束依从性分析[J]. 计算机研究与发展, 2017, 54(10): 2404-2418. CSTR: 32373.14.issn1000-1239.2017.20170397
引用本文: 薄阳, 夏春和. 业务流程授权约束依从性分析[J]. 计算机研究与发展, 2017, 54(10): 2404-2418. CSTR: 32373.14.issn1000-1239.2017.20170397
Bo Yang, Xia Chunhe. Compliance Analysis of Authorization Constraints in Business Process[J]. Journal of Computer Research and Development, 2017, 54(10): 2404-2418. CSTR: 32373.14.issn1000-1239.2017.20170397
Citation: Bo Yang, Xia Chunhe. Compliance Analysis of Authorization Constraints in Business Process[J]. Journal of Computer Research and Development, 2017, 54(10): 2404-2418. CSTR: 32373.14.issn1000-1239.2017.20170397

业务流程授权约束依从性分析

基金项目: 国家自然科学基金联合基金项目(U1636208);中航工业产学研项目(CXY2011BH07)
详细信息
  • 中图分类号: TP391

Compliance Analysis of Authorization Constraints in Business Process

  • 摘要: 授权约束的依从性研究是业务流程安全领域中的重要研究内容.针对授权约束提出了全新的业务流程依从性分析框架,该框架可以处理:1)流程授权和非流程授权;2)业务流程任务委托;3)角色继承关系;4)职责分离和职责绑定约束;5)静态约束和动态约束.提出授权图表示依从性分析框架,并给出授权图的构造和化简方法对授权图进行维护,然后设计了针对授权图的依从性分析算法.基于分析结果,给出了不依从授权约束的冲突模式,针对每一种冲突模式设计一组解决方案,并实现了原型系统.所提出的授权约束依从性分析框架独立于系统部署的平台,适用范围广泛.最后通过实例分析和实验验证说明了该方法的有效性.
    Abstract: A novel framework of business process compliance analysis is proposed in this paper, and the proposed framework can process 1)business process authorization and non-business process authorization; 2)delegation of task of business processes; 3)inheritance of roles; 4)separation of duty and binding of duty constraints; 5)statics constraints and dynamic constraints. Authorization graph is proposed to describe the framework, and construct and reduce methods of authorization graph are designed to maintain the graph, then compliance analysis algorithms of authorization graph are proposed. Based on the analysis results, conflict patterns are presented. A set of resolutions for each pattern are provided, and a prototype system is implemented. The framework of authorization constraint compliance analysis, independent of platform, can be widely applied to system security analyzing. The effectiveness of the proposed method is reported by a case study and experiments at the end of this paper.
计量
  • 文章访问数:  1092
  • HTML全文浏览量:  0
  • PDF下载量:  436
  • 被引次数: 0
出版历程
  • 发布日期:  2017-09-30

目录

    /

    返回文章
    返回