Distributed Workflow environment of the adaptivity of Color Matching of access control model

Xiaoxi Zhang

Abstract


To in distributed workflow environment inIn order to make user get the most appropriate of permissions to implementation workflow taskOften need to user are assigned the role.For a group given authorization. of user best role Matching ProblemPut forward a kind of distributed workflow environment of the adaptivity of Color Matching of access control model.The model can according to workflow of different taskFrom System of role in looking for related task implementation permissions of a group or multi-role collectionThen reference environment,Time Constraint and role between the inheritance relationship to the matching optimizationFinal for user select optimal of role collection.Experimental show thatThe model can eliminate redundant roleFor user accurate distribution a group the smallest role collectionSo as to achieve role matching optimization of objective.


Keywords


Access ControlDistributed WorkflowRole matchingEnvironment and Time Constraint

Full Text:

PDF

Included Database


References


Wangyd,Yangjh,Xuc,Etal.surfonaccesscontroltechnologiesforcloudcomputingJ .Journalofsoftware,2015,26(5.):1129-1150.(InChinese)

Fengcs,Qinzg,Yuand,Etal.keytechniquesofaccesscontrolforcloudcomputingJ .Acaelectronicasinica,2015,43(2.):312-319.(InChinese)

Lifh,Sum,Shizg,Etal.researchstatusanddevelopmenttrendsofaccesscontrolmodelJ .Acaelectronicasinica,2012,40(4.):805-813.(InChinese)

Lin. discretionaryaccesscontrolM Encyclopediaofcryp-Tographyandsecurity. springerus,2011:353-356.

andj,Gaoj,Zhaihl,Etal.researchdevelopmentofaccesscontrolmodelJ .Computerscience,2010,37(11):29-33.

Upadhyayas. mandatoryaccesscontrolM Encyclope-diaofCryptographyandSecurity.SpringerUS,2011:756-758.

Sandhurs,Coyneej,Feinsteinhl,Etal. Role-based AccesscontrolmodelsJ . Computer,1996,29.(2.):38-47.

Zhangxm,Huangzq,SUNY. researchonprivacyac- CesscontrolbasedonrbacJ . Computerscience,2016,43(1.):166-171.(InChinese)

Wangxw,Zhaoym.atask-role-basedaccesscontrolmodelforcloudcomputingJ .Computerengineering,2012,38(24):9-13.

Wang yuding,Yang jiahai,Xu Cong,Wait..Overview of cloud computing Access Control TechnologyJ .Journal of software,2015,26(5.):1129-1150.

Li FengHua,Su Chong,Shi zhenguo,Wait..Research Progress and Development Trend of access control modelJ .Journal of electronics,2012,40(4.):805-813.

Zhang xueming,Huang Zhiqiu,Sun Yi.Based onRBACResearch on privacy Access ControlJ .Computer Science,2016,43(1.):166-171.

Wang Xiaowei,Zhao yiming.A cloud computing access control model based on task roleJ .Computer Engineering,2012,38(24):9-13.

Han dajun,Gao Jie,Zhai Hao Liang,Wait..Research Progress of access control modelJ .Computer Science,2010,37(11):29-33.

Feng chaosheng,Qin zhiguang,Yuan ding,Wait..Key Technologies of access control in cloud computingJ . Journal of electronics,2015,43(2.):312-319.


Refbacks

  • There are currently no refbacks.