Injecting formulized delegation constraints into secure workflow systems

Li Zhao, Qing Li, Guoqing Wu

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

Abstract

In a secure workflow system, it is imperative to specify which users (or roles) can be authorized to execute which specific tasks. Users may also be able to delegate their rights of executing a task to others. Much of research work in the area of delegation has been carried out. In this paper, we provide a new formal method for representing delegation constraints in secure workflow systems, by adding a trust relationship and propagation parameters to make delegation propagation more effective. We also analyze the consistency after the delegation constraints are injected into the secure workflow systems.

Original languageEnglish
Title of host publication2008 IEEE International Conference on Information Reuse and Integration, IEEE IRI-2008
Pages370-373
Number of pages4
DOIs
Publication statusPublished - 23 Sep 2008
Externally publishedYes
Event2008 IEEE International Conference on Information Reuse and Integration, IEEE IRI-2008 - Las Vegas, NV, United States
Duration: 13 Jul 200815 Jul 2008

Publication series

Name2008 IEEE International Conference on Information Reuse and Integration, IEEE IRI-2008

Conference

Conference2008 IEEE International Conference on Information Reuse and Integration, IEEE IRI-2008
CountryUnited States
CityLas Vegas, NV
Period13/07/0815/07/08

ASJC Scopus subject areas

  • Information Systems
  • Software

Cite this