Abstract
Workflow technology is gaining major influence in many application domains. Especially, with the progress of the ubiquitous computing technology, a context-aware workflow has received considerable attention as a new workflow approach for a ubiquitous computing environment. This paper discusses security considerations for context-aware workflow systems and presents an architecture of a context-aware workflow authorization management (CAWAM) system. The CAWAM system offers management and enforcement of an authorization policy for context-aware workflow systems, and provides security-related context management functions. The CAWAM system utilizes the GCRBAC model for an access control service. In addition, the system supports a web-based policy management user interface.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ardissono, L., et al.: Adaptive medical workflow management for a context-dependent home healthcare asistance service. In: First International Workshop on Context for Web Services 2005, pp. 59–68 (2006)
Westkaemper, E., et al.: Smart factory - bridging the gap between digital planning and reality. In: 38th CIRP International Seminar on Manufacturing Systems (2005)
Lucke, D., et al.: Smart factory - a step towards the next genereation of manufacturing. In: 41st CIRP Conference on Manufacturing Systems, pp. 115–118 (2008)
Wieland, M., et al.: Towards context-aware workflows. In: Proc. of UMICS 2007 (2007)
Wieland, M., et al.: Context Integration for Smart Workflows. In: Proc. of 6th PERCOM, pp. 239–242 (2008)
Bertino, E., et al.: TRBAC: A temporal role-based access control model. ACM TISSEC 4(3), 191–233 (2001)
Covington, M.J., et al.: A Context-Aware Security Architecture for Emerging Applications. In: Proc. of 18th ACSAC, pp. 249–258 (2002)
Bertino, E., et al.: GEO-RBAC: A Spatially Aware RBAC. In: Proc. of 10th ACM SACMAT, pp. 29–37 (2005)
Ray, I., Toahchoodee, M.: A spatio-temporal role-based access control model. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 211–226. Springer, Heidelberg (2007)
Chen, L., Crampton, J.: On Spatio-Temporal Constraints and Inheritance in Role-Based Access Control. In: Proc. of ASIACCS 2008, pp. 156–167 (2008)
Park, S.-H., et al.: Context-Role Based Access control for Context-Aware Application. In: Gerndt, M., Kranzlmüller, D. (eds.) HPCC 2006. LNCS, vol. 4208, pp. 572–580. Springer, Heidelberg (2006)
Atluri, V., Huang, W.-K.: An authorization model for workflows. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 44–64. Springer, Heidelberg (1996)
Wu, S., et al.: Authorization and Access Control of Application Data in Workflow Systems. Journal of Intelligent Information Systems 18, 71–94 (2002)
Thomas, R.K., Sandhu, R.S.: Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management. In: The IFIP WG11.3 Workshop on Database Security, pp. 166–181 (1997)
Ferraiolo, D.F., et al.: Proposed NIST Standard for Role-Based Access Control. ACM TISSEC 4(3), 224–274 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, SH., Han, YJ., Eom, JH., Chung, TM. (2009). Architecture of Context-Aware Workflow Authorization Management Systems for Workflow-Based Systems. In: Hong, C.S., Tonouchi, T., Ma, Y., Chao, CS. (eds) Management Enabling the Future Internet for Changing Business and New Computing Services. APNOMS 2009. Lecture Notes in Computer Science, vol 5787. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04492-2_38
Download citation
DOI: https://doi.org/10.1007/978-3-642-04492-2_38
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04491-5
Online ISBN: 978-3-642-04492-2
eBook Packages: Computer ScienceComputer Science (R0)