Abstract
The Business Entity method is a new approach for declarative Business Process Modeling. An important aspect of this method is access control rules that determine what users can access what data under what conditions. This paper describes an extension of Semantics of Business Vocabulary and Business Rules (SBVR) for defining these access control rules. A tool supports the creation of these data access control rules by a combination of a matrix format and conditions given in SBVR Structured English. The rules are stored according to the SBVR metamodel, and may be visualized either as individual rules or in a matrix.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Prabir, N., et al.: Data4BPM Part 1: Introducing Business Entities and the Business Entity Definition Language (BEDL). IBM developerWorks, http://www.ibm.com/developerworks/websphere/library/techarticles/1004_nandi/1004_nandi.html
Nigam, A., Caswell, N.S.: Business artifacts: An approach to operational specification. IBM Systems Journal 42(3), 428–445 (2003)
Nandi, P., Kumaran, S.: Adaptive Business Object: A New Component Model for Business Integration. In: Proceedings of International Conference on Enterprise Information Systems, ICEIS (2005)
Kumaran, S.: Model Driven Enterprise. In: Proceedings of Global Integration Summit, Banff, Canada (2004)
Hull, R.: Artifact-centric Business Process Models: Brief Survey of Research Results and Challenges. In: Meersman, R., Tari, Z. (eds.) OTM 2008, Part II. LNCS, vol. 5332, pp. 1152–1163. Springer, Heidelberg (2008)
Object Modeling Group (OMG): Business Process Modeling Notation Version 2.0 Beta 1, http://www.omg.org/spec/BPMN/2.0/
Linehan, M.: SBVR Use Cases. In: Bassiliades, N., Governatori, G., Paschke, A. (eds.) RuleML 2008. LNCS, vol. 5321, pp. 128–196. Springer, Heidelberg (2008)
Linehan, M.: Ontologies and Rules in Business Models. In: Proceedings of the 2007 Eleventh International IEEE EDOC Conference Workshop, pp. 149–156 (2007)
InterNational Committee for Information Technology Standards, Information Technology - Role Based Access Control, ANSI/INCITS 359-2004 (2004), http://www.techstreet.com/standards/INCITS/359_2004?product_id=1151353
National Institute of Standards and Technology (NIST), Role Based Access Control (RBAC) and Role Based Security, http://csrc.nist.gov/groups/SNS/rbac/
Object Modeling Group (OMG): Semantics of Business Vocabulary and Business Rules Specification, Version 1.0 (2007), http://www.omg.org/spec/SBVR/1.0/
OASIS: eXtensible Access Control Markup Language (XACML), version 2.0 (2005), http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xacml
OASIS: Core and hierarchical role based access control (RBAC) profile of XACML 2.0 (2005), http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-rbac-profile1-spec-os.pdf
Barker, S.: The next 700 access control models or a unifying meta-model? In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (SACMAT), ACM, New York (2009), http://portal.acm.org/citation.cfm?id=1542207.1542238&coll=ACM&dl=ACM&CFID=98850045&CFTOKEN=13091977
Goedertier, S., Mues, C., Vanthienen, J.: Specifying Process-Aware Access Control Rules in SBVR. In: Paschke, A., Biletskiy, Y. (eds.) RuleML 2007. LNCS, vol. 4824, pp. 39–52. Springer, Heidelberg (2007), http://www.econ.kuleuven.be/tew/academic/infosys/RESEARCH/PROLOGA/refsdtpubs/ProcessAwareRules.pdf
Goedertier, S., Vanthienen, J.: EM-BrA2CE v0.2: A vocabulary and execution model for declarative business process modeling. In: ter Hofstede, A.H.M., Benatallah, B., Paik, H.-Y. (eds.) BPM Workshops 2007. LNCS, vol. 4928, pp. 496–501. Springer, Heidelberg (2008)
Vanthienen, J., Dries, E.: Illustration of a Decision Table Tool for Specifying and Implementing Knowledge Based Systems. In: Fifth International Conference on Tools with Artificial Intelligence (TAI), pp. 198–205 (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Linehan, M.H. (2010). Defining Access Control Rules with Conditions. In: Dean, M., Hall, J., Rotolo, A., Tabet, S. (eds) Semantic Web Rules. RuleML 2010. Lecture Notes in Computer Science, vol 6403. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16289-3_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-16289-3_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16288-6
Online ISBN: 978-3-642-16289-3
eBook Packages: Computer ScienceComputer Science (R0)