Abstract
Firstly considering the problems in e-government authorization model, we analyze the features of government business process. Then an inner-organization authorization model based on organization is proposed. Then based on the proposed model, an authorization model for inter-organizational business process collaboration is designed. This model can resolve the problem of separating organization and authorization, reduce the difficulty of authorization management to make it more suitable for government management mechanism, and be of great application values.
Keywords
Download to read the full chapter text
Chapter PDF
References
E. Bertiijo, P.A. Bonatti, and E. Ferrari, TBAC: A Temporal Role-Based Access Control for the World Wide Web, inProc. of Fifth ACM Workshop on Role-Based Access Control(Berlin, Germany, July, 2000).
R. Viviani, A Type/Domain Security Policy for Internet Transmission Sharing and Archiving of Medical and Biological Data,International Workshop, Policies for Distributed Systems and Networks (Policy 01)(Bristol, January, 2001).
E. Kohen, R.K. Thomas, W. Winsborough, and D. Shands, Models for Coalition-Based Access Control (CBAC),Seventh ACM Symposium on Access Control Models and Technologies (SACMAT’ 02)(Monterey, California, June, 2002).
Q. Jiang and T. Jiang, A Distributed and Hierarchical Government Organization Model,Inter-organizational Business Integration. ICICIC2007(2007).
E. Bertino, S. Jajodia, and P. Samarati, Supporting Multiple Access Control Policies in Database Systems, inProc. of IEEE Symposium on Security and Privacy(Oakland, USA, 1996).
S. Oh and R. Sandhu, A Model for Role Administration Using Organization Structure,Seventh ACM Symposium on Access Control Models and Technologies (SACMAT)(Monterey, California, June 3-4, 2002), pp.155–162.
G. Dinolt, L. Benzinger, and M. Yatabe, Combining Components and Policies,Proc. of the Computer Security Foundations Workshop VII(Franconia, 1994).
G.-J. Ahn and R. Sandhu, Role-Based Authorization Constraints Specification,ACM Transactions on Information and System Security. Volume 3, Number 4, (2000).
F. Cuppens, L. Cholvy, C. Saurel, and J. Carr`ere, Merging Regulations: analysis of a practical example,Internationaljournal of Intelligent Systems. Volume 16, Number 11, (2001).
J.B.D. Joshi, E. Bertino, and A. Ghafoor, Temporal Hierarchies and Inheritance Semantics for GTRBAC,Seventh ACM Symposium on Access Control Models and Technologies(Monterey, California, June, 2002).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 IFIP International Federation for Information Processing
About this paper
Cite this paper
Qiu, J., Tian, J., Wang, Y. (2007). A Research on the Authorization Model Based on Organizational Management in E-Gov. In: Xu, L.D., Tjoa, A.M., Chaudhry, S.S. (eds) Research and Practical Issues of Enterprise Information Systems II. IFIP — The International Federation for Information Processing, vol 254. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-75902-9_45
Download citation
DOI: https://doi.org/10.1007/978-0-387-75902-9_45
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-0563-8
Online ISBN: 978-0-387-75902-9
eBook Packages: Computer ScienceComputer Science (R0)