TY - GEN
T1 - Injecting formulized delegation constraints into secure workflow systems
AU - Zhao, Li
AU - Li, Qing
AU - Wu, Guoqing
PY - 2008/9/23
Y1 - 2008/9/23
N2 - In a secure workflow system, it is imperative to specify which users (or roles) can be authorized to execute which specific tasks. Users may also be able to delegate their rights of executing a task to others. Much of research work in the area of delegation has been carried out. In this paper, we provide a new formal method for representing delegation constraints in secure workflow systems, by adding a trust relationship and propagation parameters to make delegation propagation more effective. We also analyze the consistency after the delegation constraints are injected into the secure workflow systems.
AB - In a secure workflow system, it is imperative to specify which users (or roles) can be authorized to execute which specific tasks. Users may also be able to delegate their rights of executing a task to others. Much of research work in the area of delegation has been carried out. In this paper, we provide a new formal method for representing delegation constraints in secure workflow systems, by adding a trust relationship and propagation parameters to make delegation propagation more effective. We also analyze the consistency after the delegation constraints are injected into the secure workflow systems.
UR - http://www.scopus.com/inward/record.url?scp=51949110554&partnerID=8YFLogxK
U2 - 10.1109/IRI.2008.4583059
DO - 10.1109/IRI.2008.4583059
M3 - Conference article published in proceeding or book
AN - SCOPUS:51949110554
SN - 9781424426607
T3 - 2008 IEEE International Conference on Information Reuse and Integration, IEEE IRI-2008
SP - 370
EP - 373
BT - 2008 IEEE International Conference on Information Reuse and Integration, IEEE IRI-2008
T2 - 2008 IEEE International Conference on Information Reuse and Integration, IEEE IRI-2008
Y2 - 13 July 2008 through 15 July 2008
ER -