An object-oriented organizational model to support dynamic role-based access control in electronic commerce

被引:10
作者
Cheng, EC [1 ]
机构
[1] Univ London Birkbeck Coll, OCT Res Lab, San Mateo, CA 94403 USA
关键词
electronic commerce; role-based access control; organization modeling; role resolution; business process management; workflow;
D O I
10.1016/S0167-9236(00)00083-X
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Role-based access control (RBAC) provides flexibility to security management over the traditional approach of using user and group identifiers. In RBAC, access privileges are given to roles rather than to individual users. Users acquire the corresponding permissions when playing different roles. Roles can be defined simply as a label, but such an approach lacks the support to allow users to automatically change roles under different contexts; using static method also adds administrative overheads in role assignment. In electronic commerce (E-Commerce) and other cooperative computing environments, access to shared resources has to be controlled in the context of the entire business process; it is therefore necessary to model dynamic roles as a function of resource attributes and contextual information. In this paper, an object-oriented organizational model, Organization Modeling and Management (OMM), is presented as an underlying model to support dynamic role definition and role resolution in E-Commerce solution. The paper describes the OMM reference model and shows how it can be applied flexibly to capture the different classes of resources within a corporation, and to maintain the complex and dynamic roles and relationships between the resource objects. Administrative tools use the role model in OMM to define security policies for role definition and role assignment. At runtime, the E-Commerce application and the underlying resource manager queries the OMM system to resolve roles in order to authorize any access attempts. Contrary to traditional approaches, OMM separates the organization model from the applications; thus, it allows independent and flexible role modeling to support realistically the dynamic authorization requirements in a rapidly changing business world. (C) 2000 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:357 / 369
页数:13
相关论文
共 35 条
[1]  
[Anonymous], P 2 IEEE WORKSH EN T
[2]   THE M-ASTERISK-OBJECT METHODOLOGY FOR INFORMATION-SYSTEM DESIGN IN CIM ENVIRONMENTS [J].
BERIO, G ;
DILEVA, A ;
GIOLITO, P ;
VERNADAT, F .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1995, 25 (01) :68-85
[3]  
BERTINO E, 1997, P 2 ACM ROL BAS ACC
[4]  
BLUM D, 1994, E MAIL FRONTIER EMER, P295
[5]  
BUSSLER C, 1994, P 3 INT C AUT ROB CO
[6]  
BUSSLER C, 1996, P PRIISM 96 C MAUI H
[7]  
CHENG E, 1998, P ISCA 11 INT C CHIC
[8]  
CHENG E, 1997, OMM MODEL TECHNICAL
[9]  
CHENG E, 1991, P USENIX C
[10]  
CHENG E, 1995, P INT WORK C INF IND