Injecting RBAC to secure a Web-based workflow system.
Gail-Joon AhnRavi S. SandhuMyong H. KangJoon S. ParkPublished in: ACM Workshop on Role-Based Access Control (2000)
Keyphrases
- access control
- security mechanisms
- rbac model
- role based access control
- workflow systems
- data security
- workflow management systems
- multimedia
- access control mechanism
- security requirements
- role based access control model
- workflow management
- security issues
- data flow
- security analysis
- security protocols
- multi domain
- petri net
- key management
- service platform
- fine grained
- business processes
- covert channel
- lightweight