pdf

Role-based secure workflow model

  • 2013-09-21
  • 129KB
  • Points it Requires : 2

Apply the role-based access control model RBAC96 to the workflow, design a role-based secure workflow model, and give a formal description and graphical representation of the model. Define the concepts of DCAC, EP, EPA, IP, and IPA to manage authorization in the model. Compared with the previous role-based workflow model, it focuses on the authority relationship between documents, tasks, and roles, and strengthens the management of document permissions. Keywords: role; security; workflow

unfold

You Might Like

Uploader
huhuhah0009
 

Recommended ContentMore

Popular Components

Just Take a LookMore

EEWorld
subscription
account

EEWorld
service
account

Automotive
development
circle

About Us Customer Service Contact Information Datasheet Sitemap LatestNews


Room 1530, 15th Floor, Building B, No.18 Zhongguancun Street, Haidian District, Beijing, Postal Code: 100190 China Telephone: 008610 8235 0740

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京ICP证060456号 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号
×