hrcak mascot   Srce   HID

Izvorni znanstveni članak
https://doi.org/10.2498/cit.2003.04.04

Design of an Integrated Role-Based Access Control Infrastructure for Adaptive Workflow Systems

Nanjangud C Narendra

Puni tekst: engleski, pdf (198 KB) str. 293-308 preuzimanja: 673* citiraj
APA 6th Edition
C Narendra, N. (2003). Design of an Integrated Role-Based Access Control Infrastructure for Adaptive Workflow Systems. Journal of computing and information technology, 11 (4), 293-308. https://doi.org/10.2498/cit.2003.04.04
MLA 8th Edition
C Narendra, Nanjangud. "Design of an Integrated Role-Based Access Control Infrastructure for Adaptive Workflow Systems." Journal of computing and information technology, vol. 11, br. 4, 2003, str. 293-308. https://doi.org/10.2498/cit.2003.04.04. Citirano 28.09.2020.
Chicago 17th Edition
C Narendra, Nanjangud. "Design of an Integrated Role-Based Access Control Infrastructure for Adaptive Workflow Systems." Journal of computing and information technology 11, br. 4 (2003): 293-308. https://doi.org/10.2498/cit.2003.04.04
Harvard
C Narendra, N. (2003). 'Design of an Integrated Role-Based Access Control Infrastructure for Adaptive Workflow Systems', Journal of computing and information technology, 11(4), str. 293-308. https://doi.org/10.2498/cit.2003.04.04
Vancouver
C Narendra N. Design of an Integrated Role-Based Access Control Infrastructure for Adaptive Workflow Systems. Journal of computing and information technology [Internet]. 2003 [pristupljeno 28.09.2020.];11(4):293-308. https://doi.org/10.2498/cit.2003.04.04
IEEE
N. C Narendra, "Design of an Integrated Role-Based Access Control Infrastructure for Adaptive Workflow Systems", Journal of computing and information technology, vol.11, br. 4, str. 293-308, 2003. [Online]. https://doi.org/10.2498/cit.2003.04.04

Sažetak
With increasing numbers of organizations automating their business processes by using workflow systems, security aspects of workflow systems has become a heavily researched area. Also, most workflow processes nowadays need to be adaptive, i.e., constantly changing, to meet changing business conditions. However, little attention has been paid to integrating Security and Adaptive Workflow. In this paper, we investigate this important research topic, with emphasis on Role Based Access Control (RBAC) in Adaptive Workflow. Based on our earlier work on a 3-tier adaptive workflow architecture, we present the design of a similar 3-tier RBAC infrastructure, and we show that it conceptually mirrors our adaptive workflow architecture. We also describe the mappings between them, and we show how this mapping can be used to manage organizational RBAC constraints when the workflows are being adapted continuously. We illustrate our ideas throughout the paper with a simple yet non-trivial example.

Hrčak ID: 44737

URI
https://hrcak.srce.hr/44737

Posjeta: 847 *