7 CONCLUSION AND FUTURE
WORK
In this paper, we propose a new Inter-Organizational
Workflow Based Access Control (IOW-BAC) ap-
proach. The new approach extends RBAC model with
a new entities and associations in order to support the
main requirements of distributed workflow systems.
Besides, we present a new algorithm to resolve po-
tential detected conflicts occurring during the compo-
sition of the global Access Control policy. This algo-
rithm is based on a set of important parameters. The
organization weight, the object owner, object sensi-
tivity level and the task criticality level to evaluate the
importance of the executed task.
The next stage of our work is the implementation
of our approach using the eXtensible Access Control
Markup Language (XACML) standard. Moreover, we
look to propose a new approach based on automated
negotiation.
REFERENCES
Atluri, V. and Huang, W.-K. (2000). A petri net based safety
analysis of workflow authorization models1. Journal
of Computer Security, 8(2-3):209–240.
Duan, L., Chen, S., Zhang, Y., Liu, C., Liu, D., Liu, R. P.,
and Chen, J. (2015). Automated policy combina-
tion for data sharing across multiple organizations. In
Services Computing (SCC), 2015 IEEE International
Conference on, pages 226–233. IEEE.
Elkandoussi, A. and Elbakkali, H. (2014). On access con-
trol requirements for inter-organizational workflow. In
Security Days (JNS4), Proceedings of the 4th Edition
of National, pages 1–6. IEEE.
Elkandoussi, A., Elbakkali, H., and Elhilali, N. (2015). To-
ward resolving access control policy conflict in inter-
organizational workflows. In Computer Systems and
Applications (AICCSA), 2015 IEEE/ACS 12th Inter-
national Conference of, pages 1–4. IEEE.
Gouglidis, A. and Mavridis, I. (2012). domrbac: An ac-
cess control model for modern collaborative systems.
computers & security, 31(4):540–556.
Hu, H., Ahn, G.-J., and Jorgensen, J. (2013). Multiparty
access control for online social networks: model and
mechanisms. IEEE Transactions on Knowledge and
Data Engineering, 25(7):1614–1627.
Le, X. H., Doll, T., Barbosu, M., Luque, A., and Wang,
D. (2012). An enhancement of the role-based access
control model to facilitate information access manage-
ment in context of team collaboration and workflow.
Journal of biomedical informatics, 45(6):1084–1107.
Ma, C.-h., Lu, G.-d., and Qiu, J. (2009). Conflict detection
and resolution for authorization policies in workflow
systems. Journal of Zhejiang University-Science A,
10(8):1082–1092.
Oh, S. and Park, S. (2003). Task–role-based access control
model. Information systems, 28(6):533–562.
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman,
C. E. (1996). Role-based access control models. Com-
puter, 29(2):38–47.
Specification, W. (1999). Workflow management coali-
tion terminology & glossary (document no. wfmc-tc-
1011). Workflow Management Coalition Specifica-
tion.
Thomas, R. K. and Sandhu, R. S. (1998). Task-based autho-
rization controls (tbac): A family of models for active
and enterprise-oriented authorization management. In
Database Security XI, pages 166–181. Springer.
Wang, B. Y., Zhang, W. X., and Zhang, S. M. (2015). An
improved task and role-based access control model
with multi-constraint. In Applied Mechanics and Ma-
terials, volume 713, pages 2532–2535. Trans Tech
Publ.
Wang, H., Sun, L., and Varadharajan, V. (2010). Purpose-
based access control policies and conflicting analysis.
In SEC, pages 217–228. Springer.
Yang, W. and Liu, Y. (2012). An organization-based access
control model for workflow and dynamic constraints
implementation. I JACT: International Journa lof Adv
ancements in Computing Technology, 4(1):477–484.
ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy
352