Digital Library
Close Browse articles from a journal
 
<< previous    next >>
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
           All articles of the corresponding issues
                                       Details for article 6 of 17 found articles
 
 
  A Proposed Security Model for Web Enabled Business Process Management System
 
 
Title: A Proposed Security Model for Web Enabled Business Process Management System
Author: M. S. Kandi
Mohamed Abu El-Soud
A. E. Hassan
Abd elghafar M. Elhady
Appeared in: International journal of computer science and security
Paging: Volume 4 (2010) nr. 5 pages 436-450
Year: 2010
Contents: Business Process Management systems (BPMS) and technologies are currently used in many organizations’ IT applications. This could lead to a dramatic operational efficiency improvement on their business and administrative environments. With these atmospheres, the security issue is becoming a much more important challenge in the BPMS literature. The RoleBased Access Control (RBAC) model has been accepted as a promise security model solution and standard. RBAC is able to accomplish the central administration of an organizational specific security policy. It is also able to meet the secure processing needs of many commercial and civilian government organizations. In spite of these facts, RBAC model is not reliable when applying to the BPMS without further modifications and extensions. RBAC is modified to fit with Service oriented (SRBAC), but still not reliable enough to handle BPMS. Authors of that research proposed a security model based on SRBAC model to be more reliable when using with BPMS. Authors of that research named that proposed security model as Improved Role Based Access Control (IRBAC). The IRBAC model is directly applicable to the BPMS. Authors defined a graphical representation and technical implementation of the IRBAC model. This IRBAC model is tested using simple case study. The test compares between the IRBAC model and SRBAC model where IRBAC is implemented in two cases (IRBAC with caching and IRBAC with no caching). The test results show the validity and performability of the IRBAC model.
Publisher: Computer Science Journals (provided by DOAJ)
Source file: Elektronische Wetenschappelijke Tijdschriften
 
 

                             Details for article 6 of 17 found articles
 
<< previous    next >>
 
 Koninklijke Bibliotheek - National Library of the Netherlands