Font Size: a A A

The Research And Implementation Of Workflow Access Control Model Based On TRBAC

Posted on:2013-01-16Degree:MasterType:Thesis
Country:ChinaCandidate:D WangFull Text:PDF
GTID:2218330374964910Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with theworkflow technology in the office automation domain widespread application, the Workflow Management System security problems have becomeincreasingly prominent. As a safety protection technology, the Access Control Technology has been widely used in Workflow Management Systems to ensure the security of data and validity of authority.First, this paper made sufficient survey onthe current workflow technology and the access control models, and combined with the requirements for access control of workflow management system, this paper summed up the advantages and limitations of various access control models. Second, a workflow access control model based on TRBAC which is the excellent modelsuitable for workflow management system was proposed.This model retains the advantages of TRBAC, puts the "task" and "role" to the center position of the access control model. The user is firstlyassigned the roles, and then attains the appropriate permissions after getting the executable task. The model achieved the dynamic authorization and the least privilege.From the application angle, the thesis also made some improvements of TRBAC model. Classify the task to solve the problem of private permissions, and use the conflict entities and relationships between tasks to express the Implementation of dynamic SoD constraints.And then, this paper implements the model from technology level on the basis of above theory, and applies the model to the workflow Management System to form the access control subsystem. The paper carried out the general design, detail module design and the data design, and describes the specific implementation method of the important functions such as the allocations of entities in the subsystem, definitions of the conflict entities and the constraint detection.Finally, a process instance is used to track the running process of subsystem, and thus proving efficiency and applicability of the model.
Keywords/Search Tags:workflow, access control model, TRBAC
PDF Full Text Request
Related items