Skip to main content

Architecture of Context-Aware Workflow Authorization Management Systems for Workflow-Based Systems

  • Conference paper
Management Enabling the Future Internet for Changing Business and New Computing Services (APNOMS 2009)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 5787))

Included in the following conference series:

  • 967 Accesses

Abstract

Workflow technology is gaining major influence in many application domains. Especially, with the progress of the ubiquitous computing technology, a context-aware workflow has received considerable attention as a new workflow approach for a ubiquitous computing environment. This paper discusses security considerations for context-aware workflow systems and presents an architecture of a context-aware workflow authorization management (CAWAM) system. The CAWAM system offers management and enforcement of an authorization policy for context-aware workflow systems, and provides security-related context management functions. The CAWAM system utilizes the GCRBAC model for an access control service. In addition, the system supports a web-based policy management user interface.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ardissono, L., et al.: Adaptive medical workflow management for a context-dependent home healthcare asistance service. In: First International Workshop on Context for Web Services 2005, pp. 59–68 (2006)

    Google Scholar 

  2. Westkaemper, E., et al.: Smart factory - bridging the gap between digital planning and reality. In: 38th CIRP International Seminar on Manufacturing Systems (2005)

    Google Scholar 

  3. Lucke, D., et al.: Smart factory - a step towards the next genereation of manufacturing. In: 41st CIRP Conference on Manufacturing Systems, pp. 115–118 (2008)

    Google Scholar 

  4. Wieland, M., et al.: Towards context-aware workflows. In: Proc. of UMICS 2007 (2007)

    Google Scholar 

  5. Wieland, M., et al.: Context Integration for Smart Workflows. In: Proc. of 6th PERCOM, pp. 239–242 (2008)

    Google Scholar 

  6. Bertino, E., et al.: TRBAC: A temporal role-based access control model. ACM TISSEC 4(3), 191–233 (2001)

    Article  Google Scholar 

  7. Covington, M.J., et al.: A Context-Aware Security Architecture for Emerging Applications. In: Proc. of 18th ACSAC, pp. 249–258 (2002)

    Google Scholar 

  8. Bertino, E., et al.: GEO-RBAC: A Spatially Aware RBAC. In: Proc. of 10th ACM SACMAT, pp. 29–37 (2005)

    Google Scholar 

  9. Ray, I., Toahchoodee, M.: A spatio-temporal role-based access control model. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 211–226. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  10. Chen, L., Crampton, J.: On Spatio-Temporal Constraints and Inheritance in Role-Based Access Control. In: Proc. of ASIACCS 2008, pp. 156–167 (2008)

    Google Scholar 

  11. Park, S.-H., et al.: Context-Role Based Access control for Context-Aware Application. In: Gerndt, M., Kranzlmüller, D. (eds.) HPCC 2006. LNCS, vol. 4208, pp. 572–580. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  12. Atluri, V., Huang, W.-K.: An authorization model for workflows. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 44–64. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  13. Wu, S., et al.: Authorization and Access Control of Application Data in Workflow Systems. Journal of Intelligent Information Systems 18, 71–94 (2002)

    Article  Google Scholar 

  14. Thomas, R.K., Sandhu, R.S.: Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management. In: The IFIP WG11.3 Workshop on Database Security, pp. 166–181 (1997)

    Google Scholar 

  15. Ferraiolo, D.F., et al.: Proposed NIST Standard for Role-Based Access Control. ACM TISSEC 4(3), 224–274 (2001)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, SH., Han, YJ., Eom, JH., Chung, TM. (2009). Architecture of Context-Aware Workflow Authorization Management Systems for Workflow-Based Systems. In: Hong, C.S., Tonouchi, T., Ma, Y., Chao, CS. (eds) Management Enabling the Future Internet for Changing Business and New Computing Services. APNOMS 2009. Lecture Notes in Computer Science, vol 5787. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04492-2_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04492-2_38

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04491-5

  • Online ISBN: 978-3-642-04492-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics