[1] Aalst W V D, Hee K V. Workflow management:models, methods, and systems[M]. Cambridge:MIT Press, 2004. [2] 余阳, 王颍, 刘醒梅, 等. 基于社会关系的工作流任务分派策略研究[J]. 软件学报, 2015, 26(3):562-573. Yu Y, Wang Y, Liu X M, et al. Workflow task assignment strategy based on social context[J]. Journal of Software, 2015, 26(3):562-573. (in Chinese) [3] 郭秦龙, 闻立杰, 金涛, 等. NBAJ:一种基于网络流的工作流资源分配合理性判定方法[J]. 计算机集成制造系统, 2015, 21(2):326-335. Guo Q L, Wen L J, Jin T, et al. NBAJ:workflow resource assignment satisfaction judgment method based on network-flow[J]. Computer Integrated Manufacturing Systems, 2015, 21(2):326-335. (in Chinese) [4] 熊厚仁, 陈性元, 张斌, 等. 基于RBAC的授权管理安全准则分析与研究[J]. 计算机科学, 2015, 42(3):117-123. Xiong H R, Chen X Y, Zhang B, et al. Security principles for RBAC-based authorization management[J]. Computer Science, 2015, 42(3):117-123. (in Chinese) [5] Mitra B, Sural S, Vaidya J, et al. A survey of role mining[J]. ACM Computing Surveys, 2016, 48(4):1-37. [6] 熊厚仁, 陈性元, 费晓飞, 等. 基于属性和RBAC的混合扩展访问控制模型[J]. 计算机应用研究, 2016, 33(7):2162-2169. Xiong H R, Chen X Y, Fei X F, et al. Attribute and RBAC-based hybrid access control model[J]. Application Research of Computers, 2016, 33(7):2162-2169. (in Chinese) [7] 于会松, 孟照旭, 黄华晔, 等. 基于映射的角色访问控制模型的设计与实现[J]. 计算机仿真, 2016, 33(4):292-295. Yu H S, Meng Z X, Huang H Y, et al. Design and implementation of mapping-based role access control model[J]. Computer Simulation, 2016, 33(4):292-295. (in Chinese) [8] Zhu H, Zhang W, Wang Y, et al. A role-permission assignment method of RBAC involved conflicting constraints under E-CARGO[J]. International Journal of Cognitive Informatics & Natural Intelligence, 2015, 9(4):49-64. [9] 王于丁, 杨家海, 徐聪, 等. 云计算访问控制技术研究综述[J]. 软件学报, 2015, 26(5):1129-1150. Wang Y D, Yang J H, Xu C, et al. Survey on access control technologies for cloud computing[J]. Journal of Software, 2015, 26(5):1129-1150. (in Chinese) [10] Albrecht-Buehler C. Task-based access control in a virtualization environment:US8595824[P]. 2011-08-09 [11] Liu M, Wang X. Safeness discussions on TRBAC and GTRBAC model and an improved temporal role-based access control model[J]. International Journal of Security & Its Applications, 2015, 9(8):23-34. [12] Hu V, Ferraiolo D, Kuhn R, et al. Guide to attribute based access control (ABAC) definition and considerations[J]. ITLB, 2013, 12(1):162-174. [13] 黄毅, 李肯立. 一种面向云计算的任务-角色访问控制模型[J]. 计算机应用研究, 2013, 30(12):3735-3737. Huang Y, Li K L. Model of cloud computing oriented T-RBAC[J]. Application Research of Computers, 2013, 30(12):3735-3737. (in Chinese) [14] Qi H, Luo X, Di X, et al. Access control model based on role and attribute and its implementation[C]//International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. IEEE, 2016:66-71. [15] 蔡婷, 聂清彬, 欧阳凯, 等. 基于角色扩展的RBAC模型[J]. 计算机应用研究, 2016, 33(3):882-885. Cai T, Nie Q B, Ouyang K, et al. Role-extended-based RBAC model[J]. Application Research of Computers, 2016, 33(3):882-885. (in Chinese) [16] 熊厚仁, 陈性元, 张斌, 等. 基于双层角色和组织的可扩展访问控制模型[J]. 电子与信息学报, 2015, 37(7):1612-1619. Xiong H R, Chen X Y, Zhang B, et al. Scalable access control model based on double-tier role and organization[J]. Journal of Electronics & Information Technology, 2015, 37(7):1612-1619. (in Chinese) [17] 周炜. 具有时空约束的TRBAC模型在OA中的应用[J]. 网络安全技术与应用, 2014, 32(8):116-117. Zhou W. Application of TRBAC model with temporal and spatial constraints in OA[J]. Net Security Technologies and Application, 2014, 32(8):116-117. (in Chinese) [18] 李金艳, 余忠华. 面向协作的柔性工作流访问控制机制[J]. 计算机集成制造系统, 2017, 23(6):1234-1242. Li J Y, Yu Z H. Access control mechanism of cooperation-oriented flexible workflow[J]. Computer Integrated Manufacturing Systems, 2017, 23(6):1234-1242. (in Chinese) [19] 闫春钢, 蒋昌俊, 丁志军, 等. 工作流网系统合理性的语言特性[J]. 应用科学学报, 2011, 29(1):61-65. Yan C G, Jiang C J, Ding Z J, et al. Language properties for rationality of workflow net system[J]. Journal of Applied Sciences, 2011, 29(1):61-65. (in Chinese) [20] Bhuyan F A, Lu S, R. Reynolds, et al. A security framework for scientific workflow provenance access control policies[J]. IEEE Transactions on Services Computing, 2019, 16(6):11-26. [21] Ghazal R, Qadeer N, Malik A K, et al. Intelligent agent-based RBAC model to support cyber security alliance among multiple organizations in global IT systems[C]//17th International Conference on Information Technology New Generations. Springer, Cham, 2020:87-93. [22] Siegel J. OMG overview:CORBA and the OMA in enterprise computing[J]. Communications of the ACM, 1998, 41(10):37-43. [23] Aalst W V D, Adams M, Russell N. Modern business process automation:YAWL and its support environment[M]. Berlin:Springer, 2010. |