期刊文献+

SOA业务流程安全性研究综述

A survey of security studies of business process in SOA
在线阅读 下载PDF
导出
摘要 安全性是影响SOA在企业范围内部署实施的重要因素,而业务流程的安全性是其中的难点与重点,近几年来,国内外学者从多个方面对其开展了大量的研究工作,主要包括基于业务流程的角色工程、业务流程的动态授权管理和联盟中跨域访问控制;文章对这些研究的目前进展进行综述,并提出了业务流程系统安全今后的发展方向。 Security is the key issue that influences the deployment of SOA in enterprises, and the security of the business process in distributed environment is the key point. In recent years, researchers at home and abroad have done lots of studies from different aspects, which includes role engineering, dynamic authorization of the business process and cross domain access control of the business process in the federatiotx This paper presents a brief survey of the recent studies and points out the future development in these fields.
作者 李锐 甄田甜
出处 《合肥工业大学学报(自然科学版)》 CAS CSCD 北大核心 2009年第5期659-662,共4页 Journal of Hefei University of Technology:Natural Science
基金 交通运输部交通信息化建设资助项目(2008127)
关键词 业务流程 角色工程 访问控制 动态授权 business process role engineering access control dynamic authorization
作者简介 李锐(1962-),男,安徽太和人,安徽交通职业技术学院副教授.
  • 相关文献

参考文献25

  • 1IBM.基于服务的建模和架构[EB/OL].http://www.ibm.com/developerworks/cn/webservices/ws-soa-design1/,2004-11-01.
  • 2OASIS.WS-BPEL TC[EB/OL].http://www.oasis-open.org,2008-12-26.
  • 3Curbera F,Goland Y,Klein J,et al.Business Process Execution Language for Web Services (BPEL4WS),2002.[EB/OL].http://www-106.ibm.com/developerworks/webservices/library/ws-bpel/,2007-02-08.
  • 4OASIS Standard 200401.Web services security:SOAP message security 1.0 (WS security 2004)[S].
  • 5IBM,Microsoft.Security in a Web Services World:A Proposed Architecture and Roadmap,Version 1.0[EB/OL].http://www-106.ibm.com/developerworks/library/ws-secmap/,2002-04-01.
  • 6Josuttis N M.SOA实践指南--分布式系统设计的艺术[M].北京:电子工业出版社,2008:63-126.
  • 7Web Services Security (WS-Security),2002[EB/OL].http://www-106.ibm.com/developerworks/webservices/library/ws-secure/,2008-12-26.
  • 8Bartel M,Boyer J,Fox B,et al.XML-Signature Syntax and Processing,W3C,IETF,2002[EB/OL].http://www.w3.org/TR/xmldsig-core/,2007-07-08.
  • 9Web Services Federation Language (WS-Federation) Version 1.0[EB/OL].http://www-106.ibm.com/developerworks/library/ws-fed/,2003-07-12.
  • 10W3C XML Encryption Working Group.W3C,IETF,2002[EB/OL].http://www.w3.org/Encryption/,2007-03-07.

二级参考文献55

  • 1张燕燕.一个可行的基于角色的PMI授权管理方案[J].信息安全与通信保密,2005(2):179-182. 被引量:3
  • 2欧阳俊,杨贯中,杨柳,刘美琴,陆绍飞.一种基于Petri网的审批业务工作流模型[J].计算机应用,2005,25(3):688-690. 被引量:4
  • 3徐洪学,刘永贤.基于RBAC的CSCD系统工作流授权模型[J].计算机应用,2005,25(10):2424-2427. 被引量:1
  • 4[1]WFMC-TC-0021019.Workflow Management Coalition Work-flow Security Considerations White Paper.http://www.wfmc.org.
  • 5[2]John A.Miller,Mei Fan,Amit,P.Sheth and Kry J.Kochut.ACM Trans.on Information and System Security.Security in Web-based Workflow Management Systems.2002.
  • 6[3]Kandala S,Sandhu R.Secure Role-based Workflow Models[J].In Proceedings of the 15th IFIP WGl1.3 Working Conference on Database Security,Kluwer,2002:45-58.
  • 7[5]R K Thomas,R Sandhu.Task-based authorization controls (TBAC),A family of models for active and enterprise-oriented au-thorization managenent.In:T Y Lin.S Qian eds.Database Security XI:Status and Prospects.CA:Chapman & Hall,1997,166-181.
  • 8WU Sheng-li, SHETH A, MILLER J, et al. Authorization and access control of application data in woddlow system[J]. Journal of Intelligent Information System, 2002,18( 1 ) : 71-94.
  • 9SANDHU R, FERRAIOLO D, KUHN R. Proposed NIST standard for role-based access control[J]. ACM Transactions on Information and System Security, 2001, 4(3):224-274.
  • 10TC00-1003, Workflow management coalition the workflow reference model[S].

共引文献233

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部