Abstract
Workflow technology is gaining major influence in many application domains. Especially, with the progress of the ubiquitous computing technology, a context-aware workflow has received considerable attention as a new workflow approach for a ubiquitous computing environment. This paper discusses security considerations for context-aware workflow systems and presents an architecture of a context-aware workflow authorization management (CAWAM) system. The CAWAM system offers management and enforcement of an authorization policy for context-aware workflow systems, and provides security-related context management functions. The CAWAM system utilizes the GCRBAC model for an access control service. In addition, the system supports a web-based policy management user interface.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ardissono, L., et al.: Adaptive medical workflow management for a context-dependent home healthcare asistance service. In: First International Workshop on Context for Web Services 2005, pp. 59–68 (2006)
Westkaemper, E., et al.: Smart factory - bridging the gap between digital planning and reality. In: 38th CIRP International Seminar on Manufacturing Systems (2005)
Lucke, D., et al.: Smart factory - a step towards the next genereation of manufacturing. In: 41st CIRP Conference on Manufacturing Systems, pp. 115–118 (2008)
Wieland, M., et al.: Towards context-aware workflows. In: Proc. of UMICS 2007 (2007)
Wieland, M., et al.: Context Integration for Smart Workflows. In: Proc. of 6th PERCOM, pp. 239–242 (2008)
Bertino, E., et al.: TRBAC: A temporal role-based access control model. ACM TISSEC 4(3), 191–233 (2001)
Covington, M.J., et al.: A Context-Aware Security Architecture for Emerging Applications. In: Proc. of 18th ACSAC, pp. 249–258 (2002)
Bertino, E., et al.: GEO-RBAC: A Spatially Aware RBAC. In: Proc. of 10th ACM SACMAT, pp. 29–37 (2005)
Ray, I., Toahchoodee, M.: A spatio-temporal role-based access control model. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 211–226. Springer, Heidelberg (2007)
Chen, L., Crampton, J.: On Spatio-Temporal Constraints and Inheritance in Role-Based Access Control. In: Proc. of ASIACCS 2008, pp. 156–167 (2008)
Park, S.-H., et al.: Context-Role Based Access control for Context-Aware Application. In: Gerndt, M., Kranzlmüller, D. (eds.) HPCC 2006. LNCS, vol. 4208, pp. 572–580. Springer, Heidelberg (2006)
Atluri, V., Huang, W.-K.: An authorization model for workflows. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 44–64. Springer, Heidelberg (1996)
Wu, S., et al.: Authorization and Access Control of Application Data in Workflow Systems. Journal of Intelligent Information Systems 18, 71–94 (2002)
Thomas, R.K., Sandhu, R.S.: Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management. In: The IFIP WG11.3 Workshop on Database Security, pp. 166–181 (1997)
Ferraiolo, D.F., et al.: Proposed NIST Standard for Role-Based Access Control. ACM TISSEC 4(3), 224–274 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, SH., Han, YJ., Eom, JH., Chung, TM. (2009). Architecture of Context-Aware Workflow Authorization Management Systems for Workflow-Based Systems. In: Hong, C.S., Tonouchi, T., Ma, Y., Chao, CS. (eds) Management Enabling the Future Internet for Changing Business and New Computing Services. APNOMS 2009. Lecture Notes in Computer Science, vol 5787. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04492-2_38
Download citation
DOI: https://doi.org/10.1007/978-3-642-04492-2_38
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04491-5
Online ISBN: 978-3-642-04492-2
eBook Packages: Computer ScienceComputer Science (R0)