Delegation Pattern in Workflow System
- 1 July 2010
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 189-195
- https://doi.org/10.1109/compsacw.2010.75
Abstract
The best practices in workflow techniques might be constructed as workflow patterns. Van der Aalst and Russel categorized and discussed workflow patterns about several perspectives such as control flow, data, resources and exception handling. Delegation behavior is an important issue in modern workflow system. Although Russel described “resource delegation pattern” in his work, more patterns about delegation need be studied. In this paper, we present eleven basic and seven advanced delegation patterns extracted from current delegation mechanisms in RBAC and workflow systems. All the patterns are clarified with examples; on the other hand, the issues along with the patterns such as restrictions, the delegation operation adopted, etc. are also discussed.Keywords
This publication has 15 references indexed in Scilit:
- Delegation in role-based access controlInternational Journal of Information Security, 2007
- Graph-theoretic method for merging security system specificationsInformation Sciences, 2007
- Delegation in the role graph modelPublished by Association for Computing Machinery (ACM) ,2006
- A fine-grained, controllable, user-to-user delegation method in RBACPublished by Association for Computing Machinery (ACM) ,2005
- Role-Based Delegation Model/ Hierarchical Roles (RBDM1)Published by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Task–role-based access control modelInformation Systems, 2003
- PBDMPublished by Association for Computing Machinery (ACM) ,2003
- A model of OASIS role-based access control and its support for active securityPublished by Association for Computing Machinery (ACM) ,2001
- Towards a more complete model of rolePublished by Association for Computing Machinery (ACM) ,1998
- Role-based access control modelsComputer, 1996