2014
DOI: 10.1007/s12599-014-0343-3
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Support for Role-Based Delegation in Process-Aware Information Systems

Abstract: The paper presents an integrated approach for the modeling and enforcement of delegation policies in process-aware information systems. Based on a generic formal metamodel, the detection of delegation-related conflicts is discussed and a set of pre-defined resolution strategies for these conflicts is provided. Moreover, a corresponding UML extension, a prototypical proof of concept implementation, and a case study with real-world business processes is provided.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 49 publications
0
6
0
1
Order By: Relevance
“…Process models capture information on process activities, the flow relation between those activities, organisational resources that perform the activities, and information artefacts that are used and produced by the activities (Curtis et al , 1992). The information provided by process models on organisational resources – the organisational perspective – is used in a variety of ways in organisations, such as in learning responsibilities (Davies et al , 2006), managing resources (Browning, 2010) and allocating resources to tasks (Schefer-Wenzl and Strembeck, 2014).…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…Process models capture information on process activities, the flow relation between those activities, organisational resources that perform the activities, and information artefacts that are used and produced by the activities (Curtis et al , 1992). The information provided by process models on organisational resources – the organisational perspective – is used in a variety of ways in organisations, such as in learning responsibilities (Davies et al , 2006), managing resources (Browning, 2010) and allocating resources to tasks (Schefer-Wenzl and Strembeck, 2014).…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…of k-n RSSOD constraints, and the output is set C = {c 1 ,c 2 ,...} of 2-2 SMER constraints, such that C enforces E. In order to construct 2-2 SMER constraints, it is necessary to find a set of roles S, such that each role in S at least has permissions in e i (line 4). Then, if any role has all the permissions in e i , we declare e i as nonenforceable (lines [5][6][7][8]; otherwise, we analyze each pair of roles (r i , r j ) to determine whether they are valid 2-2 SMER constraints. If r i and r j are mutually exclusive roles, each one contains at least a mutually exclusive permission that must be absent in the other (lines 9-17).…”
Section: Algorithm 2 Construction Of 2-2 Smer Constraintsmentioning
confidence: 99%
“…With the successful implementations of RBAC systems, designing an effective, complete set of roles and constructing a good RBAC system have become critical tasks. As a solution to facilitate the process of migrating from a non-RBAC system to an RBAC system, role-engineering technology [8,9] has been proposed. There are two main approaches: top-down [10] and bottom-up [11][12][13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…The top-down role-engineering approach defines particular roles for job responsibilities and decomposes them into smaller units by analyzing the business processes of organizations in detail. Once the required privileges for performing specific tasks are identified, they are grouped into appropriate functional roles [10]. This process is repeated until all the job functions are covered.…”
Section: Introductionmentioning
confidence: 99%