Managing workflow authorization constraints through active database technology

被引:32
作者
Casati, F
Castano, S
Fugini, MG
机构
[1] Hewlett Packard Labs, Palo Alto, CA 94304 USA
[2] Univ Milan, Dipartimento Sci Informaz, I-20135 Milan, Italy
[3] Politecn Milan, Dipartimento Elettron & Informaz, I-20133 Milan, Italy
关键词
workflows; authorizations; authorization constraints; roles; active databases; triggers;
D O I
10.1023/A:1011461409620
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The execution of workflow processes requires authorizations for enforcing the assignment of tasks to agents. either human or automated, according to the security policy of the organization. This paper presents a workflow authorization framework based on roles and organizational levels, and on authorization constraints. To facilitate the assignment of tasks to agents, roles and organizational levels are organized into hierarchies. Authorization constraints are introduced to specify instance-dependent, time-dependent. and history-dependent authorizations. Authorization constraints are specified in terms of active rules, used also for authorization management. The Workflow Management System determines authorized agents on the basis of the contents of an authorization base maintained through the active rules defined in the system.
引用
收藏
页码:319 / 338
页数:20
相关论文
共 30 条
[1]  
ATLURI V, 1996, P 10 IFIP TC11 WG113
[2]  
BAAN, 1998, COSA REFERENCE MANUA
[3]  
Baralis E., 1994, P 20 INT C VER LARG
[4]  
BERTINO E, 1997, P 2 ACM WORKSH ROL B
[5]   Specification and implementation of exceptions in workflow management systems [J].
Casati, F ;
Ceri, S ;
Paraboschi, S ;
Pozzi, G .
ACM TRANSACTIONS ON DATABASE SYSTEMS, 1999, 24 (03) :405-451
[6]   Using patterns to design rules in workflows [J].
Casati, F ;
Castano, S ;
Fugini, M ;
Mirbel, I ;
Pernici, B .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2000, 26 (08) :760-785
[7]  
CASATI F, 2000, MANAGING WORKFLOW AU
[8]  
CASATI F, 1998, P 10 INT C ADV INF S
[9]  
CASATI F, 1999, J COMPUTER SECURITY, V6
[10]  
CASTANO S, DATABASE SECURITY