Font Size: a A A

Study And Design On Access Control Model Of Workflow Management System

Posted on:2008-01-23Degree:MasterType:Thesis
Country:ChinaCandidate:J LaiFull Text:PDF
GTID:2178360215988081Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the wide use of computer and network in daily life, workflow has become a critical technology for enterprise on coordinating business process, enhancing the abilities of meeting an emergency and of competitive power. The model of workflow management system as the process definition of workflow system, plays the pivotal role in workflow system, the research of it rapidly becomes a focus.This article first introduces the development situation of the workflow technology, summarizes the development tendency of workflow technology, introduced the workflow reference model which issued by Workflow Management Coalition(WFMC).On the basis of thorough analysis of various kinds of traditional and present access control models, this article issues improvement schemes to make up the insufficiency of the description ability of task dependence relations and the solution of the private privilege problem, then carries on the design of processing component of the improved model to further explain the improvement necessity.The work in this article emphasizes the study of access control model of workflow management system. On the basis of analysis of various kinds of access control models, this article issues improvement schemes to make up their insufficiency in workflow system. Much creative work has been done in these aspects:■Improvement has been made to task dependence relations of the T-RBAC model. One kind of new model element "connector" has been introduced in the model to draw out control information from the task and package them separately. This improvement on the one hand strengthens the description ability of task dependence relations, on the other hand makes advantage to the dynamic revision of model of workflow management system. This improvement also may utilize to all task-centered access control model;■To the private privileges problem in role hierarchies, on the basis of the solution of setting limited scope of inheritance, presents a revised solution to break the limit of that the spread of private privileges in role hierarchies must be continuous and the limit of that one role can not be inherited by onemore role, and provides a algorithm which can be used in T-RBAC model;■This article carries on the design of processing component of the improved model, which fully considers reliability, practicality, and extensibility, to further explain the improvement necessity.
Keywords/Search Tags:workflow, workflow management, access control model, role, task, privileges
PDF Full Text Request
Related items