A PKI-based lightweight workflow model
The workflow model is the abstract expression of the workflow or the business process. Following the WfMC reference model, a PKI-based lightweight workflow model named as PBLW is put forward in this paper. The framework of PBLW is proposed. Based on the time constraint directed graph, the workflow t...
Saved in:
Published in | 2005 International Conference on Control and Automation Vol. 2; pp. 1062 - 1067 Vol. 2 |
---|---|
Main Authors | , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
2005
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The workflow model is the abstract expression of the workflow or the business process. Following the WfMC reference model, a PKI-based lightweight workflow model named as PBLW is put forward in this paper. The framework of PBLW is proposed. Based on the time constraint directed graph, the workflow theory model in formalization is described in detail, and the time constraint problems are discussed in order to enhance the time management ability of the workflow model. Furthermore, in order to express the complicated secure access control constraint of the workflow, a conditioned RBAC model based on PKJ technology is presented, according to the traditional RBAC security access control model. Finally, the workflow engine driven algorithms for the workflow instance are given. By the actual inspection and users' feedback, it proves that this model can express the basic requirements of a majority of the process applications. |
---|---|
AbstractList | The workflow model is the abstract expression of the workflow or the business process. Following the WfMC reference model, a PKI-based lightweight workflow model named as PBLW is put forward in this paper. The framework of PBLW is proposed. Based on the time constraint directed graph, the workflow theory model in formalization is described in detail, and the time constraint problems are discussed in order to enhance the time management ability of the workflow model. Furthermore, in order to express the complicated secure access control constraint of the workflow, a conditioned RBAC model based on PKJ technology is presented, according to the traditional RBAC security access control model. Finally, the workflow engine driven algorithms for the workflow instance are given. By the actual inspection and users' feedback, it proves that this model can express the basic requirements of a majority of the process applications. |
Author | Niya Li Chengquan Hu Jian Zhang Jigui Sun Zehai Li |
Author_xml | – sequence: 1 surname: Jian Zhang fullname: Jian Zhang organization: Coll. of Comput. Sci. & Technol., Jilin Univ., Changchun, China – sequence: 2 surname: Jigui Sun fullname: Jigui Sun organization: Coll. of Comput. Sci. & Technol., Jilin Univ., Changchun, China – sequence: 3 surname: Niya Li fullname: Niya Li organization: Coll. of Comput. Sci. & Technol., Jilin Univ., Changchun, China – sequence: 4 surname: Chengquan Hu fullname: Chengquan Hu organization: Coll. of Comput. Sci. & Technol., Jilin Univ., Changchun, China – sequence: 5 surname: Zehai Li fullname: Zehai Li organization: Coll. of Comput. Sci. & Technol., Jilin Univ., Changchun, China |
BookMark | eNo9j0tLw0AUhQetYFv7A8RNVu4m3juPzMwyBB_Bgi50XeZxo9G0kaQQ_PdaLG7Otzh8B86CzXb9jhi7RMgRwd3UVVXmAkDnqIUVxp2wOTpluVTanLIFGAvSoTRy9l8od85W4_gBAAhWFwBzdl1mz481D36klHXt2_t-okNmUz98Nl0_Zds-UXfBzhrfjbQ6csle725fqge-frqvq3LNWwS9556KILVJAYtYWE1EKlnjmiAxRksqCK8SWY9Cu6iscAfIJqBy2tvo5JJd_e22v-7ma2i3fvjeHC_KH97DQ00 |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICCA.2005.1528279 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Xplore IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1948-3457 |
EndPage | 1067 Vol. 2 |
ExternalDocumentID | 1528279 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR ACGFS ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI M43 OCL RIE RIL RNS |
ID | FETCH-LOGICAL-i105t-ae6b357db16c685eee4d879fb31cc8e4b2a4de8a1259c482959c43fb1495a8c93 |
IEDL.DBID | RIE |
ISBN | 0780391373 9780780391376 |
ISSN | 1948-3449 |
IngestDate | Wed Jun 26 19:27:08 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i105t-ae6b357db16c685eee4d879fb31cc8e4b2a4de8a1259c482959c43fb1495a8c93 |
ParticipantIDs | ieee_primary_1528279 |
PublicationCentury | 2000 |
PublicationDate | 20050000 |
PublicationDateYYYYMMDD | 2005-01-01 |
PublicationDate_xml | – year: 2005 text: 20050000 |
PublicationDecade | 2000 |
PublicationTitle | 2005 International Conference on Control and Automation |
PublicationTitleAbbrev | ICCA |
PublicationYear | 2005 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0001085600 ssj0000454418 |
Score | 1.3664874 |
Snippet | The workflow model is the abstract expression of the workflow or the business process. Following the WfMC reference model, a PKI-based lightweight workflow... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1062 |
SubjectTerms | Access control Computer science Computer science education Constraint theory Educational technology Engines Knowledge engineering Laboratories Time factors Workflow management software |
Title | A PKI-based lightweight workflow model |
URI | https://ieeexplore.ieee.org/document/1528279 |
Volume | 2 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07b8IwED4BU7vQAlXfylB1qiGJHT9GhIqgFRVDkdiQ7dhSVQRVFYTUX1_bCfShDp3iZPAjUXx3n-_7DuCGaescVaaRccYBkZQJJAQRiPBMU4mttLEnOE-e6GhGHubZvAZ3ey6MMSYkn5mub4az_HytNx4q67nuuOutDnUepyVXa4-neCk5Uu2zAV9xvgQNDBQXpnOECREhaudeEh0zXInv7O5pdeKZxKI3Hgz6JdpSDfij8kowPMMmTHZTLvNNXrubQnX1xy81x_-u6Qg6XxS_aLo3XsdQM6sWNHc1HqLql2_B4TfBwjbc9qPp4xh505dHSx_XbwO0Gvn0Lrtcb6NQWacDs-H982CEqkoL6MX5VwWShiqcsVwlVFOeuUmSnDNhFU605oaoVJLccOm8IaEJT4W_YKt8eCW5FvgEGqv1ypxCxE2c2sRaJhknlmAZS0lMxg21iXI76xm0_UtYvJViGotq_ed_P76Ag6CVGjCPS2gU7xtz5byAQl2Hz_8JY0Wn_A |
link.rule.ids | 310,311,786,790,795,796,802,4069,4070,27956,55107 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07b8IwED5ROrRdaIGq72aoOtU0wY4fI0JFUB5iAIkNOY4tVUVQVUFI_fW1nUAf6tApTgY_osR39_m-7wDumDLWUWUKaWscEGkygYQgAhEeKyqxkSZ0BOfhiHan5HkWz0rwsOPCaK198pluuKY_y09Xau2gskfbHbe97cG-tfMhy9laO0TFicmRYqf1CIv1JqjnoNhAnSNMiPBxO3ei6JjhQn5ne0-LM88oFI-9druV4y3FkD9qr3jT06nAcDvpPOPktbHOkob6-KXn-N9VHUP9i-QXjHfm6wRKelmFyrbKQ1D89FU4-iZZWIP7VjDu95AzfmmwcJH9xoOrgUvwMovVJvC1deow7TxN2l1U1FpAL9bDypDUNMExS5OIKspjO0mSciZMgiOluCZJU5JUc2n9IaEIbwp3wSZxAZbkSuBTKC9XS30GAddh00TGMMk4MQTLUEqiY66piRK7t55Dzb2E-VsupzEv1n_x9-NbOOhOhoP5oDfqX8KhV071CMgVlLP3tb62PkGW3PhP4RN5CatQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2005+International+Conference+on+Control+and+Automation&rft.atitle=A+PKI-based+lightweight+workflow+model&rft.au=Jian+Zhang&rft.au=Jigui+Sun&rft.au=Niya+Li&rft.au=Chengquan+Hu&rft.date=2005-01-01&rft.pub=IEEE&rft.isbn=9780780391376&rft.issn=1948-3449&rft.eissn=1948-3457&rft.volume=2&rft.spage=1062&rft.epage=1067+Vol.+2&rft_id=info:doi/10.1109%2FICCA.2005.1528279&rft.externalDocID=1528279 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1948-3449&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1948-3449&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1948-3449&client=summon |