skip to main content
10.1145/1089551.1089668acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicecConference Proceedingsconference-collections
Article

PRES: a practical flexible RBAC workflow system

Published: 15 August 2005 Publication History

Abstract

Web-based workflow can be used to facilitate enterprise business process while the security and flexibility are two of the most important aspects in electronic business system. RBAC is regarded as a neutral policy and has been the most popular secure model in recent years. The flexible RBAC workflow model (FRWM) has been proposed recently. It has encapsulated RBAC and workflow together considering both security and flexibility features. In this paper the enforcement of FRWM is introduced. We also present the design and implementation of a practical system for Property Right Exchange (PRES) based on FRWM, in which the flexibility of workflow can be reached through definition and execution while considering the security with RBAC.

References

[1]
G.-J. Ahn, R. Sandhu, M. Kang, and J. Park. Injecting RBAC to Secure a Web-based Workflow System. Proceedings of 5th ACM Workshop on Role Based Access Control. ACM, Berlin, Germany, July, 2000.]]
[2]
Bertino, E., Ferrari, E. and Atluri, V. "A Flexible Model For The Specification And Enforcement Of Authorization Constrains in Workflow Management System". Procedings of the Second ACM Workshop on Role-Based Access Control, 1997]]
[3]
Bertino E., Ferrari E., and Atlur V., "An Approach for the Specification and Enforcement of Authorization Constrains in Workflow Management System" ACM Transactions on Information System Security, Februry 1999, Vol. 1, No. 1.]]
[4]
E. Bertino and P. Andrea Bonatti, "TRBAC: A Temporal Role-Based Access Control Model", ACM Transaction on Information and System Security, Vol. 4, No. 3, Aug. 2001, pp. 191--223]]
[5]
Li Hong-Chen, Shi Mei-Lin, "Workflow Models and Their Formal Descriptions", Chinese Journal of Computer, Vol. 26 No. 11, Nov. 2003, 1456--1463]]
[6]
Gao Jing, Zhu Ge, "The Status and Problem of Property Rights Trade Market in China", management of Science ology and technology, 2003, 14(6):1052--1059]]
[7]
Ge Sheng, Sun Ying-Lin, Huai Jin-Peng, "A Role Base Software Collaboration Environment", Journal of Computer Research And Development, Vol. 40, No. 5,]]
[8]
J. J. Halliday, S. K. Shrivastava and S. M. Wheater, "Flexible Workflow Management in the OPENflow system", Proceedings of the 5th IEEE/OMG International Enterprise Distributed Object Computing Conference (EDOC 2001), Seattle, Sep. 2001, pp. 82--92]]
[9]
P. Heinl, S. Horn, Jablonski, J, Neeb, K. Stein, and M. Teschke, "A Comprehensive Approach to Flexibility in Workflow Management Systems", Proc. Joint Intl. Conf. on Work Activity Coordination and Collaboration, WACC'99, San Francisco, Feb, 1999, ACM Software Eng, Notes, March 1999.]]
[10]
R. Holbein, S. Teufel, "A Context Authentication Service for Role-based Accedd Control in Distributed System - CARDS". In Proceeding of IFIP 11th International Conference on Information Security. 1995]]
[11]
K. M. Jackson, J. Hruska, D. B. Paker, Computer Security Reference Book. Butter-heinemann Ltd., 1992.]]
[12]
James B. D. Joshi, etc "Dependencies and Separation of Duty Constrains in GTRBAC", Proceeding of SACMAT'os, June 2--3, 2003, Como, Italy]]
[13]
James B. D. Joshi, etc "Generalized temporal role based access control model (GTRBA) (Part I)- specification and modeling", CERIS TR 2001-47, Purdue University]]
[14]
P. J. Mangan and S. Sadiq, A constraints specification approach to building flexible workflows. Journal of Research and Practice in Information Technology, 2002]]
[15]
P. J. Mangan and S. Sadiq, "On building workflow models for flexibe process", In the 13th Australasian Dtabase Conference ADC 2002, Melbourne, Australia, 2002]]
[16]
Michael Zur Muehhlen, "Organization Management in Workflow Appplication" Information Technology and Management Journal, pp271--291, 5(2004)]]
[17]
S. Oh and S. Park, "Task-role based access control (TRBAC): An improved access control method for enterprise environment," Lecture Note in Computer Science 1873, Database and Expert Systems Applications, Proceedings of 11th International Conference, DEXA 2000, 2000, pp. 264--273]]
[18]
S. Oh and S. Park, "An integration model of role based access control and activity-based access control using task," Proceedings 14th Annual IFIP WG 11.3 Working Conference on Database Security, Aug. 2000, pp. 557--569]]
[19]
Power, T. Tangled Web, Tales of Digital Crime from the Shadows of Cyberspace. Que Macmillan Publishing, Aug.31 2000]]
[20]
Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. "Rose-based access control model {J}". IEEE Computer, Feb. 1996, 29(2):38--47]]
[21]
Ravi S. Sandhu & David Ferraiolo. "The NIST Model for role-based access control: towards a unified standard{S}", 5th ACM workshop on RBAC, 2000:47--63]]
[22]
Thomas, R. K. and Sandhu R., "Task-based suthorization controls(TBAC)" proceedings of Computer Fondations Workshop X, 1997]]
[23]
J. Wainer, etc. "Tucupi: a flexible workflow system based on overridable constraints", Proceedings of the 2004 ACM symposium on Applied computing, 2004]]
[24]
WFMC. "Workflow Management Coalition: Terminology & Glossary". WFMC-TC-1011, 1999.2. Http://www.wfmc.org}]]
[25]
Zhao W., Hu WH, Zhang SK, Wang LF. "Study and Application of a workflow meta-model". Journal of Software, 2003, 14(6):1052--1059]]
[26]
Y. Q. SUN, etc "An Approach For Flexible RBAC Workflow System", Proceeding of 9th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2005), Coventry, May, 2005 (accepted)]]

Cited By

View all
  • (2020)Distributing UAVs as Wireless Repeaters in Disaster Relief via Group Role AssignmentInternational Journal of Cooperative Information Systems10.1142/S021884302040002X29:01n02(2040002)Online publication date: 25-Feb-2020
  • (2009)Injecting a permission-based delegation model to secure web-based workflow systemsProceedings of the 2009 IEEE international conference on Intelligence and security informatics10.5555/1706428.1706446(101-106)Online publication date: 8-Jun-2009
  • (2009)RB-WAC: New approach for access control in workflows2009 IEEE/ACS International Conference on Computer Systems and Applications10.1109/AICCSA.2009.5069394(637-640)Online publication date: May-2009
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICEC '05: Proceedings of the 7th international conference on Electronic commerce
August 2005
957 pages
ISBN:1595931120
DOI:10.1145/1089551
  • Conference Chairs:
  • Qi Li,
  • Ting-Peng Liang
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 August 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. RBAC
  2. electronic business
  3. property right exchange
  4. workflow

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 150 of 244 submissions, 61%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Distributing UAVs as Wireless Repeaters in Disaster Relief via Group Role AssignmentInternational Journal of Cooperative Information Systems10.1142/S021884302040002X29:01n02(2040002)Online publication date: 25-Feb-2020
  • (2009)Injecting a permission-based delegation model to secure web-based workflow systemsProceedings of the 2009 IEEE international conference on Intelligence and security informatics10.5555/1706428.1706446(101-106)Online publication date: 8-Jun-2009
  • (2009)RB-WAC: New approach for access control in workflows2009 IEEE/ACS International Conference on Computer Systems and Applications10.1109/AICCSA.2009.5069394(637-640)Online publication date: May-2009
  • (2009)Specification and enforcement of flexible security policy for active cooperationInformation Sciences: an International Journal10.1016/j.ins.2009.01.040179:15(2629-2642)Online publication date: 1-Jul-2009
  • (2008)Defining Secure Business Processes with Respect to Multiple ObjectivesProceedings of the 2008 Third International Conference on Availability, Reliability and Security10.1109/ARES.2008.174(187-194)Online publication date: 4-Mar-2008
  • (2007)Ontology based hybrid access control for automatic interoperationProceedings of the 4th international conference on Autonomic and Trusted Computing10.5555/2394798.2394840(323-332)Online publication date: 11-Jul-2007
  • (2007)Active Authorization Management for Multi-domain Cooperation2007 11th International Conference on Computer Supported Cooperative Work in Design10.1109/CSCWD.2007.4281428(162-167)Online publication date: Apr-2007
  • (2007)Ontology Based Hybrid Access Control for Automatic InteroperationAutonomic and Trusted Computing10.1007/978-3-540-73547-2_34(323-332)Online publication date: 2007
  • (2006)An approach for implementation of RBAC models with context constraint to business process systemsProceedings of the 5th WSEAS international conference on Applied computer science10.5555/1973598.1973707(566-572)Online publication date: 16-Apr-2006
  • (2006)Optimistic anonymous participation in inter-organizational workflow instancesProceedings of the Second international conference on Information Systems Security10.1007/11961635_6(86-100)Online publication date: 19-Dec-2006
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media