Advanced Search
    Xu Wei, Wei Jun, Li Jing. A Service-Oriented Workflow Access Control Model[J]. Journal of Computer Research and Development, 2005, 42(8): 1369-1375.
    Citation: Xu Wei, Wei Jun, Li Jing. A Service-Oriented Workflow Access Control Model[J]. Journal of Computer Research and Development, 2005, 42(8): 1369-1375.

    A Service-Oriented Workflow Access Control Model

    More Information
    • Published Date: August 14, 2005
    • With the progress of enterprise globalization and the development of combination and differentiation in enterprise business, organizations become more dynamic, and business processes are frequently changing. As a result, workflow access control turns more complicated. To solve this problem, in view of decoupling the workflow access control model from the process model, a service-oriented workflow access control (SOWAC) model is presented. In the SOWAC model, service is the abstraction of a task and the unit for applying access control. Therefore, access control of tasks is replaced with access control on services. The elements of the SOWAC model are described and the enforcement of SOWAC is illustrated by an example workflow. Then the dynamic separation of duty for the SOWAC model is proposed based on the authorization history of services. By applying the SOWAC model in a real workflow system, it shows that the SOWAC model is practical and effectual.
    • Related Articles

      [1]Fu Hao, Long Chun, Gong Liangyi, Wei Jinxia, Huang Pan, Lin Yanzhong, Sun Degang. Malicious Domain Detection Technology Based on Semantic Graph Learning[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440375
      [2]Xiao Mengnan, He Ruifang, Ma Jinsong. Event Detection Based on Hierarchical Latent Semantic-Driven Network[J]. Journal of Computer Research and Development, 2024, 61(1): 184-195. DOI: 10.7544/issn1000-1239.202220447
      [3]Yao Siyu, Zhao Tianzhe, Wang Ruijie, Liu Jun. Rule-Guided Joint Embedding Learning of Knowledge Graphs[J]. Journal of Computer Research and Development, 2020, 57(12): 2514-2522. DOI: 10.7544/issn1000-1239.2020.20200741
      [4]Cheng Xiaoyang, Zhan Yongzhao, Mao Qirong, Zhan Zhicai. Video Semantic Analysis Based on Topographic Sparse Pre-Training CNN[J]. Journal of Computer Research and Development, 2018, 55(12): 2703-2714. DOI: 10.7544/issn1000-1239.2018.20170579
      [5]Tong Ming, Ding Liwei, and Ji Chenglong. Fusion of HCRF and AAM Highlight Events Detection in Soccer Videos[J]. Journal of Computer Research and Development, 2014, 51(1): 225-236.
      [6]Huang Tianqiang, Yu Yangqiang, Guo Gongde, Qin Xiaolin. Trajectory Outlier Detection Based on Semi-Supervised Technology[J]. Journal of Computer Research and Development, 2011, 48(11): 2074-2082.
      [7]Liu Sipei, Liu Dayou, Qi Hong, and Guan Jinghua. Composing Semantic Web Service with Description Logic Rules[J]. Journal of Computer Research and Development, 2011, 48(5): 831-840.
      [8]Li Haibo, Zhan Dechen, Xu Xiaofei. Integration Verification of Workflow Business Rule Semantic[J]. Journal of Computer Research and Development, 2009, 46(7): 1143-1151.
      [9]Zhang Maoyuan, Zou Chunyan, Lu Zhengding. A Fuzzy Classification of Web Pages Based on the Transposition-Learning Rule[J]. Journal of Computer Research and Development, 2007, 44(1): 99-104.
      [10]Yang Wu, Yun Xiaochun, Li Jianhua. An Efficient Approach to Intrusion Detection Based on Boosting Rule Learning[J]. Journal of Computer Research and Development, 2006, 43(7): 1252-1259.
    • Cited by

      Periodical cited type(0)

      Other cited types(1)

    Catalog

      Article views (595) PDF downloads (664) Cited by(1)

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return