A framework for access control in workflow systems
نویسندگان
چکیده
Workflow systems are often associated with business process re-engineering (BPR). This paper argues that the functional access control requirements in workflow systems are rooted in the scope of a BPR project. A framework for access control in workflow systems is developed. The framework suggests that existing role-based access control mechanisms can be used as a foundation in workflow systems. The framework separates the administration-tim e and the runtime aspects. Key areas that must be investigated to meet the functional requirements imposed by workflow systems on access control services are identified. user’s activities (an integral part of the `̀ engineering’’ strategy), whilst the `̀ engineering’’ strategy will also investigate the development of systems (the core of the `̀ systems’’ strategy) that support the coordination of the activities. This paper adopts a middle-of-the-road approach by emphasizing the interrelation of these two approaches. Against this backdrop, the existence of a magnitude of methodologies, tools and techniques in BPR (Kettinger et al., 1997) is not surprising. Application of these methodologies, tools and techniques in BPR allows us an extended scope to traditional industrial engineering (Evans et al., 1999). The `̀ width’’ scope of a BPR project is concerned with the flow of products, information and other resources. Its prime objective is to identify the enablers that speed up the flow. The `̀ breadth’’ scope of BPR determines how far reaching the impact is: across work processes, business processes, supply chains and holonic networks (Evans et al., 1999). The `̀ depth’’ scope of the BPR project considers the impact on the roles and responsibilities, the measurements and incentives, the organizational structure, the shared values, the workforce skills and the information technology influencing the people in the business. This three-dimensional scope of BPR is represented in Figure 2 by the three sides of the cube. Workflow systems provide an information technology solution particularly aimed at the `̀ computerized facilitation or automation of a business process, in whole or part’’ (Hollingsworth, 1995). This definition of workflow systems captures the correspondence between the classic concept of `̀ workflow’’ which is understood to be `̀ the set of sequences of activities which represent the functioning of an organization’’ (Khandwalla, 1977) and that of business processes, that is, of `̀ a structured set of activities designed to produce a specific output for a specific market’’ (Davenport, 1995). Business process re-engineering can thus be seen as the conceptual reconstruction of an organization to be more efficient. Workflow systems, in turn, provide part of the technology infrastructure required for the implementing and facilitation of this move towards greater efficiency in the business. In Figure 2 the arrow between the information technology depth scope of BPR and the technical enforcement level of the workflow sphere depicts this relationship. The components of a workflow system are depicted on the technology level of the workflow sphere in Figure 2. The following components can be observed: . Process definition tools are concerned with the defining and modeling of the business process and its constituent tasks. The computerized representation of the business process is called the process definition. A process definition consists of task definitions linked together by business rules. These process definitions may span the entire breadth of the BPR impact, i.e. it may cover internal processes or business processes that span a supply chain. . The workflow enactment service, consisting of one or more workflow engines, is concerned with the management of the business processes in an operational environment. At run-time, the process definition is interpreted by the workflow engine, which is responsible for creating and maintaining process instances. Task instances will be maintained for the tasks that are created based on the process definition and interpretation of the business rules. Tasks will be allocated to users or applications. . User interaction typically occurs through a worklist. The instantiated tasks are communicated to the relevant end-user through a worklist. Other IT applications may be invoked in order to complete the task. The access control sphere BPR is likely to emphasize the importance of an organization’s information resources. This results in a greater awareness of information security. Information security objectives are not only attained through technical controls, but also through operational controls (von Solms, 1999). As far Figure 1 Spheres of interest [ 127 ] Reinhardt A. Botha and Jan H.P. Eloff A framework for access control in workflow systems Information Management & Computer Security 9/3 [2001] 126±133
منابع مشابه
A framework for Access Control in Workflow Systems
Workflow systems are often associated with Business Process Re-engineering (BPR). This paper argues that the functional access control requirements in workflow systems are rooted in the scope of a BPR project. A framework for access control in Workflow Systems is developed. The framework suggests that existing Role-based Access Control (RBAC) mechanisms can be used as a foundation in workflow s...
متن کاملData Replication-Based Scheduling in Cloud Computing Environment
Abstract— High-performance computing and vast storage are two key factors required for executing data-intensive applications. In comparison with traditional distributed systems like data grid, cloud computing provides these factors in a more affordable, scalable and elastic platform. Furthermore, accessing data files is critical for performing such applications. Sometimes accessing data becomes...
متن کاملUne Approche Dynamique pour la Gestion des Politiques de Délégation dans les Systèmes de Contrôle d´Accès
Task delegation is a mechanism that supports organisational flexibility in the humancentric workflow systems, and ensures delegation of authority in access control systems. In this paper, we define an approach to support dynamic delegation of authority within an access control framework. The novelty consists of reasoning on authorisation dependently on task delegation events, and specifies them...
متن کاملW-RBAC - A Workflow Security Model Incorporating Controlled Overriding of Constraints
This paper presents a pair of role-based access control models for workflow systems, collectively known as the W-RBAC models. The first of these models, W0-RBAC is based on a framework that couples a powerful RBAC-based permission service and a workflow component with clear separation of concerns for ease of administration of authorizations. The permission service is the focus of the work, prov...
متن کاملDynamic configuration and collaborative scheduling in supply chains based on scalable multi-agent architecture
Due to diversified and frequently changing demands from customers, technological advances and global competition, manufacturers rely on collaboration with their business partners to share costs, risks and expertise. How to take advantage of advancement of technologies to effectively support operations and create competitive advantage is critical for manufacturers to survive. To respond to these...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Inf. Manag. Comput. Security
دوره 9 شماره
صفحات -
تاریخ انتشار 2001