Share Email Print

Proceedings Paper

An access control model with high security for distributed workflow and real-time application
Author(s): Ruo-Fei Han; Hou-Xiang Wang
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.

Paper Details

Date Published: 19 November 2007
PDF: 10 pages
Proc. SPIE 6784, Network Architectures, Management, and Applications V, 67843E (19 November 2007); doi: 10.1117/12.742835
Show Author Affiliations
Ruo-Fei Han, Naval Univ. of Engineering (China)
Hou-Xiang Wang, Naval Univ. of Engineering (China)

Published in SPIE Proceedings Vol. 6784:
Network Architectures, Management, and Applications V
Jianli Wang; Gee-Kung Chang; Yoshio Itaya; Herwig Zech, Editor(s)

© SPIE. Terms of Use
Back to Top