Providing Security in Granting Agency Using Workflow CRBAC Model

نویسندگان

  • Marzieh Bahrami
  • Mohammad Reza Khayyambashi
  • Seyed Ali Razavi Ebrahimi
چکیده

There have been many security solutions to secure representation in the work flow used in business processes and Grid Networks. Most of these solutions try to provide maximum security in workflow processes and most of them are used Role-Based Access Control model (RBAC). Capability Role-Base Access Control (CRBAC) is one of the models that are used to model RBAC which in this paper, we introduce these models and our proposed solution. Central idea of the model and the solution is secure Transfer ability of one user to other users within a safe and secure workflow.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Delegation Authorization Model: A Model For The Dynamic Delegation Of Authorization Rights In A Secure Workflow Management System

A workflow is a coordinated arrangement of related tasks in an automated process, the systematic execution of which, ultimately achieves some goal. Tasks that comprise the workflow process are typically dependent on one another. Security, in a workflow context, involves the implementation of access control security mechanisms to ensure that task dependencies are coordinated and that tasks are p...

متن کامل

A Petri Net Based Safety Analysis of Workflow Authorization Models

Workflow Management Systems (WFMS) are being widely used today by organizations to coordinate the execution of various applications representing their day-to-day tasks. To ensure that these tasks are executed by authorized users or processes (subjects), and to make sure that authorized subjects gain access on the required objects only during the execution of the specific task, granting and revo...

متن کامل

A Novel Assisted History Matching Workflow and its Application in a Full Field Reservoir Simulation Model

The significant increase in using reservoir simulation models poses significant challenges in the design and calibration of models. Moreover, conventional model calibration, history matching, is usually performed using a trial and error process of adjusting model parameters until a satisfactory match is obtained. In addition, history matching is an inverse problem, and hence it may have non-uni...

متن کامل

Privacy Preserving Dynamic Access Control Model with Access Delegation for eHealth

eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...

متن کامل

Does Agency Funding Affect Decisionmaking?: An Empirical Assessment of the PTO’s Granting Patterns

This Article undertakes the first empirical study of the influence of the PTO’s funding on the agency’s decision-making. More specifically, this Article studies the influence of the PTO’s budgetary structure on the most important decision made by the agency: whether or not to grant a patent. It begins by setting forth a theoretical model predicting that certain elements of the PTO’s fee schedul...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013