A PKI-based lightweight workflow model

The workflow model is the abstract expression of the workflow or the business process. Following the WfMC reference model, a PKI-based lightweight workflow model named as PBLW is put forward in this paper. The framework of PBLW is proposed. Based on the time constraint directed graph, the workflow t...

Full description

Saved in:
Bibliographic Details
Published in2005 International Conference on Control and Automation Vol. 2; pp. 1062 - 1067 Vol. 2
Main Authors Jian Zhang, Jigui Sun, Niya Li, Chengquan Hu, Zehai Li
Format Conference Proceeding
LanguageEnglish
Published IEEE 2005
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The workflow model is the abstract expression of the workflow or the business process. Following the WfMC reference model, a PKI-based lightweight workflow model named as PBLW is put forward in this paper. The framework of PBLW is proposed. Based on the time constraint directed graph, the workflow theory model in formalization is described in detail, and the time constraint problems are discussed in order to enhance the time management ability of the workflow model. Furthermore, in order to express the complicated secure access control constraint of the workflow, a conditioned RBAC model based on PKJ technology is presented, according to the traditional RBAC security access control model. Finally, the workflow engine driven algorithms for the workflow instance are given. By the actual inspection and users' feedback, it proves that this model can express the basic requirements of a majority of the process applications.
AbstractList The workflow model is the abstract expression of the workflow or the business process. Following the WfMC reference model, a PKI-based lightweight workflow model named as PBLW is put forward in this paper. The framework of PBLW is proposed. Based on the time constraint directed graph, the workflow theory model in formalization is described in detail, and the time constraint problems are discussed in order to enhance the time management ability of the workflow model. Furthermore, in order to express the complicated secure access control constraint of the workflow, a conditioned RBAC model based on PKJ technology is presented, according to the traditional RBAC security access control model. Finally, the workflow engine driven algorithms for the workflow instance are given. By the actual inspection and users' feedback, it proves that this model can express the basic requirements of a majority of the process applications.
Author Niya Li
Chengquan Hu
Jian Zhang
Jigui Sun
Zehai Li
Author_xml – sequence: 1
  surname: Jian Zhang
  fullname: Jian Zhang
  organization: Coll. of Comput. Sci. & Technol., Jilin Univ., Changchun, China
– sequence: 2
  surname: Jigui Sun
  fullname: Jigui Sun
  organization: Coll. of Comput. Sci. & Technol., Jilin Univ., Changchun, China
– sequence: 3
  surname: Niya Li
  fullname: Niya Li
  organization: Coll. of Comput. Sci. & Technol., Jilin Univ., Changchun, China
– sequence: 4
  surname: Chengquan Hu
  fullname: Chengquan Hu
  organization: Coll. of Comput. Sci. & Technol., Jilin Univ., Changchun, China
– sequence: 5
  surname: Zehai Li
  fullname: Zehai Li
  organization: Coll. of Comput. Sci. & Technol., Jilin Univ., Changchun, China
BookMark eNo9j0tLw0AUhQetYFv7A8RNVu4m3juPzMwyBB_Bgi50XeZxo9G0kaQQ_PdaLG7Otzh8B86CzXb9jhi7RMgRwd3UVVXmAkDnqIUVxp2wOTpluVTanLIFGAvSoTRy9l8od85W4_gBAAhWFwBzdl1mz481D36klHXt2_t-okNmUz98Nl0_Zds-UXfBzhrfjbQ6csle725fqge-frqvq3LNWwS9556KILVJAYtYWE1EKlnjmiAxRksqCK8SWY9Cu6iscAfIJqBy2tvo5JJd_e22v-7ma2i3fvjeHC_KH97DQ00
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICCA.2005.1528279
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1948-3457
EndPage 1067 Vol. 2
ExternalDocumentID 1528279
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
ACGFS
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
M43
OCL
RIE
RIL
RNS
ID FETCH-LOGICAL-i105t-ae6b357db16c685eee4d879fb31cc8e4b2a4de8a1259c482959c43fb1495a8c93
IEDL.DBID RIE
ISBN 0780391373
9780780391376
ISSN 1948-3449
IngestDate Wed Jun 26 19:27:08 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i105t-ae6b357db16c685eee4d879fb31cc8e4b2a4de8a1259c482959c43fb1495a8c93
ParticipantIDs ieee_primary_1528279
PublicationCentury 2000
PublicationDate 20050000
PublicationDateYYYYMMDD 2005-01-01
PublicationDate_xml – year: 2005
  text: 20050000
PublicationDecade 2000
PublicationTitle 2005 International Conference on Control and Automation
PublicationTitleAbbrev ICCA
PublicationYear 2005
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001085600
ssj0000454418
Score 1.3664874
Snippet The workflow model is the abstract expression of the workflow or the business process. Following the WfMC reference model, a PKI-based lightweight workflow...
SourceID ieee
SourceType Publisher
StartPage 1062
SubjectTerms Access control
Computer science
Computer science education
Constraint theory
Educational technology
Engines
Knowledge engineering
Laboratories
Time factors
Workflow management software
Title A PKI-based lightweight workflow model
URI https://ieeexplore.ieee.org/document/1528279
Volume 2
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07b8IwED4BU7vQAlXfylB1qiGJHT9GhIqgFRVDkdiQ7dhSVQRVFYTUX1_bCfShDp3iZPAjUXx3n-_7DuCGaescVaaRccYBkZQJJAQRiPBMU4mttLEnOE-e6GhGHubZvAZ3ey6MMSYkn5mub4az_HytNx4q67nuuOutDnUepyVXa4-neCk5Uu2zAV9xvgQNDBQXpnOECREhaudeEh0zXInv7O5pdeKZxKI3Hgz6JdpSDfij8kowPMMmTHZTLvNNXrubQnX1xy81x_-u6Qg6XxS_aLo3XsdQM6sWNHc1HqLql2_B4TfBwjbc9qPp4xh505dHSx_XbwO0Gvn0Lrtcb6NQWacDs-H982CEqkoL6MX5VwWShiqcsVwlVFOeuUmSnDNhFU605oaoVJLccOm8IaEJT4W_YKt8eCW5FvgEGqv1ypxCxE2c2sRaJhknlmAZS0lMxg21iXI76xm0_UtYvJViGotq_ed_P76Ag6CVGjCPS2gU7xtz5byAQl2Hz_8JY0Wn_A
link.rule.ids 310,311,786,790,795,796,802,4069,4070,27956,55107
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07b8IwED5ROrRdaIGq72aoOtU0wY4fI0JFUB5iAIkNOY4tVUVQVUFI_fW1nUAf6tApTgY_osR39_m-7wDumDLWUWUKaWscEGkygYQgAhEeKyqxkSZ0BOfhiHan5HkWz0rwsOPCaK198pluuKY_y09Xau2gskfbHbe97cG-tfMhy9laO0TFicmRYqf1CIv1JqjnoNhAnSNMiPBxO3ei6JjhQn5ne0-LM88oFI-9druV4y3FkD9qr3jT06nAcDvpPOPktbHOkob6-KXn-N9VHUP9i-QXjHfm6wRKelmFyrbKQ1D89FU4-iZZWIP7VjDu95AzfmmwcJH9xoOrgUvwMovVJvC1deow7TxN2l1U1FpAL9bDypDUNMExS5OIKspjO0mSciZMgiOluCZJU5JUc2n9IaEIbwp3wSZxAZbkSuBTKC9XS30GAddh00TGMMk4MQTLUEqiY66piRK7t55Dzb2E-VsupzEv1n_x9-NbOOhOhoP5oDfqX8KhV071CMgVlLP3tb62PkGW3PhP4RN5CatQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2005+International+Conference+on+Control+and+Automation&rft.atitle=A+PKI-based+lightweight+workflow+model&rft.au=Jian+Zhang&rft.au=Jigui+Sun&rft.au=Niya+Li&rft.au=Chengquan+Hu&rft.date=2005-01-01&rft.pub=IEEE&rft.isbn=9780780391376&rft.issn=1948-3449&rft.eissn=1948-3457&rft.volume=2&rft.spage=1062&rft.epage=1067+Vol.+2&rft_id=info:doi/10.1109%2FICCA.2005.1528279&rft.externalDocID=1528279
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1948-3449&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1948-3449&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1948-3449&client=summon