Information fusion is a cornerstone of competitive intelligence activity that aims at supporting decision making by collecting, analyzing and disseminating information.This information comes from heterogeneous data sources.In this paper we present an approach of access control.This approach is focused both on the information that must be bring to decision-makers and the privacy of individuals whose data is used to extract this information.This model is based on the standard "Role Based Access Control" (RBAC) and is implemented within the entire life cycle of Xplor Every Where (Web service of Tetralogie), it follows methodologies tailored to design privacy-aware systems to be compliant with data protection regulations.
Today, workflow systems which aim the automation of a business process involving the coordinated execution of multiple tasks performed by different entities have experienced an increase use. Unfortunately, little workflow management systems (WFMS) take into account access control constraints such as separation of duties (SoD). In this paper, we present a new approach, RB-WAC (role-based workflow access control), to participate in amending the above shortcomings. This approach which is based on the standard of access control RBAC, introduces new rules to detect potential conflicts related to a workflow instance and also suggests the use of the concept of priority in order to resolve these conflicts.
The need for ‘role engineering’ becomes evident once a decision has been made to adopt role-based access control (RBAC) to ensure access control in a computer system. Role engineering is a process to define roles, permissions, and role hierarchies. Therefore, it is a critical step in deploying any RBAC-oriented system. The question is even more crucial for workflow management systems: additionally to role engineering, a ‘task engineering’ process could be needed to allow the satisfaction of access control constraints even in critical situations. In this paper, we propose an approach of task engineering to improve access control enforcement in workflow management systems. By task engineering, we mean the process to examine the granularity of each workflow’s task in a way to meet – at run time – the main access control requirements, precisely the least privilege and separation of duties principles. This approach uses the constraints satisfaction problem (CSP) formulation and resolution method.
The need for “role engineering” becomes evident once a decision has been made to adopt RBAC (Role Based Access Control) to ensure access control in a computer system. Role engineering for role-based access control (RBAC) is a process to define roles, permissions, constraints, and role hierarchies. However, despite the wide use of RBAC in various applications, we noticed that the migration to RBAC is done without a suitable role engineering process.