Reference Hub3
A Location-Aware Access Control Model for Mobile Workflow Systems

A Location-Aware Access Control Model for Mobile Workflow Systems

Michael Decker
Copyright: © 2009 |Volume: 4 |Issue: 1 |Pages: 17
ISSN: 1554-1045|EISSN: 1554-1053|ISSN: 1554-1045|EISBN13: 9781615203468|EISSN: 1554-1053|DOI: 10.4018/jitwe.2009010104
Cite Article Cite Article

MLA

Decker, Michael. "A Location-Aware Access Control Model for Mobile Workflow Systems." IJITWE vol.4, no.1 2009: pp.50-66. http://doi.org/10.4018/jitwe.2009010104

APA

Decker, M. (2009). A Location-Aware Access Control Model for Mobile Workflow Systems. International Journal of Information Technology and Web Engineering (IJITWE), 4(1), 50-66. http://doi.org/10.4018/jitwe.2009010104

Chicago

Decker, Michael. "A Location-Aware Access Control Model for Mobile Workflow Systems," International Journal of Information Technology and Web Engineering (IJITWE) 4, no.1: 50-66. http://doi.org/10.4018/jitwe.2009010104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Workflow management systems (WfMS) are a special class of information systems (IS) that support the automated enactment of business processes. Meanwhile there are WfMS which allow the execution of tasks using mobile computers like PDA with the ability of wireless data transmission. However, the employment of workflow systems as well as mobile technologies comes along with special security challenges. One way to tackle these challenges is the employment of so locationaware access control to enforce rules that describe from which locations a user is allowed to perform which activities. The data model behind access control in termed access control model (ACM). There are special ACM for mobile information systems (IS) as well as for WfMS but no one that addresses mobile as well as workflow specific aspects. In the article we therefore discuss the specific constraints such a model should be able to express and introduce an appropriate ACM.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.