魂牵梦萦是什么意思| 非球面镜片是什么意思| 头自动摇摆是什么原因| 怕热是什么体质| 阴囊潮湿是什么原因造成的| eicu是什么意思| 青霉素过敏吃什么消炎药| 娟五行属什么| 吃饭出虚汗是什么原因| 什么叫阳痿| 12.6是什么星座| 1964年是什么命| 富贵命是什么生肖| 新生儿呛奶是什么原因引起的| 桥本甲状腺炎是什么意思| 野字五行属什么| 不什么下什么的成语| 舐犊是什么意思| 手掌发红是什么原因| honor是什么牌子的手机| 柯南什么时候完结| 好逸恶劳什么意思| 舌头根发麻是什么原因| 热得像什么| 理想型是什么意思| 女生肾虚是什么原因| 面部提升紧致做什么效果最好| 蚊子为什么咬人| 光明会是什么组织| 艺考是什么| 3月23是什么星座| 什么是备皮| 产妇刚生完孩子适合吃什么| 早上头晕是什么原因| uma是什么意思| 飞秒是什么| 尿路结石有什么症状| 蛞蝓是什么动物| 牙膏洗脸有什么好处和坏处| 8月11日是什么星座| 人生巅峰是什么意思| 胃酸的主要成分是什么| 屁多是什么原因造成的| 什么地方| 没有白带是什么原因| 血府逐瘀片主治什么病| 木鱼花是什么做的| 监守自盗什么意思| 鹞子是什么鸟| 鱼在鱼缸底部不动为什么| 哮喘用什么药| 牙龈是什么| 放疗化疗有什么区别| 排场是什么意思| 紫色是什么颜色| 体癣用什么药| 苑什么意思| 一暴十寒什么意思| ed病毒是什么| tr什么意思| 什么是网约车| 八是什么生肖| 反射弧长是什么意思| 肾出血是什么原因引起的| 农历六月初十是什么日子| 河豚是什么意思| 经期可以喝什么| 双手发麻是什么原因| 梦到两条蛇预示着什么| 白蛋白低吃什么| 码是什么单位| 65是什么意思| 维生素d和d3有什么区别| 石榴什么时候成熟| 杂菌2个加是什么意思| 检查肚子挂什么科| 老司机什么意思| 家里狗死了预示着什么| 什么是重心| 滴水观音叶子发黄是什么原因| 减肥喝什么茶好| 为什么会有| 左手发麻是什么病征兆| 漱口水有什么作用| 脑白质变性是什么意思| 焦虑抑郁吃什么药| 打鼾是什么意思| 麻痹是什么意思| 马齿苋治什么病| 什么牌子洗面奶好用| 宫腔内无回声区是什么意思| 梦见自己得了重病预示什么| 贱是什么意思| 耍朋友是什么意思| 口腔溃疡牙龈肿痛吃什么药| 手心干燥是什么原因| 电话正在通话中是什么意思| 腿酸是什么原因| 口腔出血是什么原因| 虹吸是什么意思| 吃粥配什么菜| 毛豆有什么营养价值| 胎儿双肾盂分离是什么意思| 心脏t波改变吃什么药| 正确的三观是什么| 海参崴买什么便宜| 磨豆浆是什么意思| 回声团是什么意思| 蝈蝈吃什么食物| 耳朵发炎吃什么消炎药| 狗狗流眼泪是什么原因| 这是什么表情包| 金与什么相生相克| 恨铁不成钢什么意思| 敲木鱼是什么意思| 沉香是什么东西| 什么药止血效果最快| 王八羔子是什么意思| 梅雨季节是什么时间| 今年37岁属什么生肖| 林伽是什么| 抗战纪念日为什么是9月3日| 小孩子拉肚子吃什么药| pcr是什么意思| 结婚10周年是什么婚| 梦遗太频繁是什么原因造成的| 扒皮是什么意思| 一什么花瓶| 肉苁蓉与什么搭配好| 滚球是什么意思| 为什么出汗特别多| 上半身皮肤痒什么原因| 云为什么是白色的| 愿字五行属什么| 皮是什么结构| 血压低吃什么药见效快| 10月24日什么星座| 黄桃什么时候上市| 电波是什么意思| 为什么头老是晕晕的| 海葵是什么| 血液粘稠会有什么症状| 腰肌劳损需要注意什么| 宝诰是什么意思| 伤口愈合为什么会痒| 月加一笔是什么字| 深明大义是什么意思| 9月是什么季节| 早上7点多是什么时辰| 吹空调嗓子疼吃什么药| 深喉是什么感觉| 什么是风湿热| 咽喉干燥是什么原因| 看颈椎挂什么科| 有始无终是什么生肖| 我的手机是什么型号| 雅漾喷雾有什么功效| 高甘油三酯血症是什么意思| 没字去掉三点水念什么| 淀粉酶高有什么危害| 世界七大奇迹分别是什么| 生理期没来是什么原因| 2018年属什么| 什么是高危性行为| 小腿发痒是什么原因| 侧柏是什么植物| 狸是什么动物| 变异性哮喘什么症状| 早餐吃什么最有营养| 鸡的祖先是什么| 拆线去医院挂什么科| 女生喝红牛有什么影响| 吃巧克力有什么好处| 肚子疼是为什么| 礻字旁与什么有关| 尿路感染是什么原因引起的| 割痔疮后吃什么恢复快| 有才是什么意思| candies什么意思| 素数是什么| 胆囊结石有什么影响| 绿色痰液是什么感染| 健康证长什么样| 掌门人是什么意思| 觉悟高是什么意思| spc是什么意思| 冬菜是什么菜| iga肾病是什么意思| 马粟是什么| 长寿面什么时候吃| 查胆固醇挂什么科| 户籍是指什么| 降火喝什么茶| 腿上无缘无故出现淤青是什么原因| o2o模式是什么意思| lee属于什么档次| 被cue是什么意思| 什么时候是排卵期| 六十岁叫什么之年| 一路向北是什么意思| 阔绰什么意思| 啄木鸟吃什么食物| 台湾三小是什么意思| 望穿秋水是什么意思| 纪梵希属于什么档次| 清炖羊肉放什么调料| 36是什么生肖| 猎头是干什么的| 年收入10万什么水平| 曲拉是什么| 肺结节吃什么药| 雪松香是什么味道| 无关风月是什么意思| 女人抖腿代表什么意思| 什么的粉墙| 热闹的什么| 打嗝是什么病| 牙痛吃什么药效果最好| 欧阳修字什么号什么| 转呼啦圈有什么好处| 不等是什么意思| 液基薄层细胞制片术是检查什么的| 洗衣机什么牌子好| 做梦怀孕了是什么意思| 尿酸高的人吃什么食物好| 指教是什么意思| hpv跟tct有什么区别| 合疗和医保有什么区别| 什么眼霜好| 拉黑和删除有什么区别| 血糖低怎么办吃什么补| 3月28号是什么星座| 人心叵测是什么意思| 眼睛总跳是什么原因| 华为最新款手机是什么型号| 什么动物站着睡觉| 补气血喝什么汤| 雨字头的字有什么| 爬虫什么意思| 阴道出血吃什么药| 没有是什么意思| 什么叫出柜| 盥洗是什么意思| 女人性冷淡吃什么药效果好| 喉咙干燥吃什么药| 老人越来越瘦是什么原因| 小孩吃什么通便降火| 头发少适合什么发型| 福禄双全是什么意思| 国家为什么要扫黄| 肺气虚吃什么药| 眼睑是什么意思| 镭射有什么危害| 99年发生了什么事情| 有时候会感到莫名的难过是什么歌| 6月22日什么星座| 饭局是什么意思| 喉咙挂什么科室| 甘油三酯低有什么危害| 5年存活率是什么意思| 阳历是什么| 梅毒通过什么途径传染| 右眼皮一直跳什么预兆| 早早孕什么时候测最准| 百度

《新剑与魔法》4月15日16点登陆异常修复公告

Policy-Based Access Control Approach to Staff Activities of a Business Process Download PDF

Info

Publication number
US20080263060A1
US20080263060A1 US11/738,794 US73879407A US2008263060A1 US 20080263060 A1 US20080263060 A1 US 20080263060A1 US 73879407 A US73879407 A US 73879407A US 2008263060 A1 US2008263060 A1 US 2008263060A1
Authority
US
United States
Prior art keywords
access control
staff activity
control system
staff
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US11/738,794
Other versions
US8904391B2 (en
Inventor
Messaoud B. Benantar
Hari Haranath Madduri
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US11/738,794 priority Critical patent/US8904391B2/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MADDURI, HARI HARANATH, BENANTAR, MESSAOUD B
Publication of US20080263060A1 publication Critical patent/US20080263060A1/en
Application granted granted Critical
Publication of US8904391B2 publication Critical patent/US8904391B2/en
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY?PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/36Creation of semantic tools, e.g. ontology or thesauri
    • G06F16/367Ontology
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/448Execution paradigms, e.g. implementations of programming paradigms
    • G06F9/4488Object-oriented
    • G06F9/4492Inheritance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5027Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
    • G06F9/5055Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals considering software capabilities, i.e. software resources associated or available to the machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY?PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY?PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • G06Q10/063118Staff planning in a project environment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY?PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/067Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY?PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management

Definitions

  • the present invention relates generally to an improved data processing system, and in particular, to dynamically binding business process activities to human entities at deployment time.
  • Business processes define a set of coordinated tasks and activities that lead to accomplishing specific goals of an organization.
  • Business processes may be implemented in a proprietary software language or may be implemented using an industry standard language, such as the Business Process Execution Language (BPEL).
  • BPEL Business Process Execution Language
  • a business process may include activities which comprise automated tasks, which are performed by computers or other machines, as well as manual activities, which require some form of human intervention.
  • activities requiring human intervention is a process in which a request for a change is received, and a human entity must assess the impact and give approval of the requested change prior to the change being implemented. Activities requiring human intervention are often called “staff activities”.
  • a particular administrator may be responsible for maintaining a particular subnet of devices with a range of IP addresses between X.Y.Z.0 and X.Y.Z.255.
  • the administrator may log into the management system and attempt to manage a device at address X.Y.Z.5.
  • the network management system uses the security policy to determine whether to allow the administrator to perform the management function on that particular device. The process of deciding which users are allowed to perform specific activities in a business process is called “staff resolution”.
  • the illustrative embodiments provide a computer implemented method, data processing system, and computer program product for dynamically binding business process activities to human entities at deployment time.
  • Identification information about a staff activity in a business process is received from a process server at an access control system external to the process server. Responsive to initiation of the business process, the staff activity is resolved at the access control system at runtime by assigning the staff activity to a user based on an access policy of the access control system to form a staff activity assignment. The staff activity assignment is communicated from the access control system to the process server.
  • the process in the illustrative embodiments allows the development of the business process to be entirely decoupled from staff activity resolution at runtime.
  • FIG. 1 depicts a pictorial representation of a distributed data processing system in which the illustrative embodiments may be implemented
  • FIG. 2 is a block diagram of a data processing system in which the illustrative embodiments may be implemented
  • FIG. 3 is a block diagram of exemplary components for implementing the policy-based access control of business process activities in accordance with the illustrative embodiments.
  • FIG. 4 is a flowchart of a process for dynamically binding business process activities to human entities in accordance with the illustrative embodiments.
  • FIGS. 1-2 exemplary diagrams of data processing environments are provided in which illustrative embodiments may be implemented. It should be appreciated that FIGS. 1-2 are only exemplary and are not intended to assert or imply any limitation with regard to the environments in which different embodiments may be implemented. Many modifications to the depicted environments may be made.
  • FIG. 1 depicts a pictorial representation of a network of data processing systems in which illustrative embodiments may be implemented.
  • Network data processing system 100 is a network of computers in which the illustrative embodiments may be implemented.
  • Network data processing system 100 contains network 102 , which is the medium used to provide communications links between various devices and computers connected together within network data processing system 100 .
  • Network 102 may include connections, such as wire, wireless communication links, or fiber optic cables.
  • network data processing system 100 is the Internet with network 102 representing a worldwide collection of networks and gateways that use the Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols to communicate with one another.
  • TCP/IP Transmission Control Protocol/Internet Protocol
  • At the heart of the Internet is a backbone of high-speed data communication lines between major nodes or host computers, consisting of thousands of commercial, governmental, educational and other computer systems that route data and messages.
  • network data processing system 100 also may be implemented as a number of different types of networks, such as for example, an intranet, a local area network (LAN), or a wide area network (WAN).
  • FIG. 1 is intended as an example, and not as an architectural limitation for the different illustrative embodiments.
  • Data processing system 200 is an example of a computer, such as server 104 or client 110 in FIG. 1 , in which computer usable program code or instructions implementing the processes may be located for the illustrative embodiments.
  • data processing system 200 employs a hub architecture including a north bridge and memory controller hub (NB/MCH) 202 and a south bridge and input/output (I/O) controller hub (SB/ICH) 204 .
  • NB/MCH north bridge and memory controller hub
  • SB/ICH south bridge and input/output controller hub
  • Processing unit 206 , main memory 208 , and graphics processor 210 are coupled to north bridge and memory controller hub 202 .
  • Processing unit 206 may contain one or more processors and even may be implemented using one or more heterogeneous processor systems.
  • Graphics processor 210 may be coupled to the NB/MCH through an accelerated graphics port (AGP), for example.
  • AGP accelerated graphics port
  • local area network (LAN) adapter 212 is coupled to south bridge and I/O controller hub 204 and audio adapter 216 , keyboard and mouse adapter 220 , modem 222 , read only memory (ROM) 224 , universal serial bus (USB) and other ports 232 , and PCI/PCIe devices 234 are coupled to south bridge and I/O controller hub 204 through bus 238 , and hard disk drive (HDD) 226 and CD-ROM 230 are coupled to south bridge and I/O controller hub 204 through bus 240 .
  • PCI/PCIe devices may include, for example, Ethernet adapters, add-in cards, and PC cards for notebook computers. PCI uses a card bus controller, while PCIe does not.
  • ROM 224 may be, for example, a flash binary input/output system (BIOS).
  • Hard disk drive 226 and CD-ROM 230 may use, for example, an integrated drive electronics (IDE) or serial advanced technology attachment (SATA) interface.
  • IDE integrated drive electronics
  • SATA serial advanced technology attachment
  • a super I/O (SIO) device 236 may be coupled to south bridge and I/O controller hub 204 .
  • An operating system runs on processing unit 206 and coordinates and provides control of various components within data processing system 200 in FIG. 2 .
  • the operating system may be a commercially available operating system such as Microsoft? Windows? XP (Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both).
  • An object oriented programming system such as the JavaTM programming system, may run in conjunction with the operating system and provides calls to the operating system from JavaTM programs or applications executing on data processing system 200 .
  • JavaTM and all JavaTTM-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
  • Instructions for the operating system, the object-oriented programming system, and applications or programs are located on storage devices, such as hard disk drive 226 , and may be loaded into main memory 208 for execution by processing unit 206 .
  • the processes of the illustrative embodiments may be performed by processing unit 206 using computer implemented instructions, which may be located in a memory such as, for example, main memory 208 , read only memory 224 , or in one or more peripheral devices.
  • FIGS. 1-2 may vary depending on the implementation.
  • Other internal hardware or peripheral devices such as flash memory, equivalent non-volatile memory, or optical disk drives and the like, may be used in addition to or in place of the hardware depicted in FIGS. 1-2 .
  • the processes of the illustrative embodiments may be applied to a multiprocessor data processing system.
  • data processing system 200 may be a personal digital assistant (PDA), which is generally configured with flash memory to provide non-volatile memory for storing operating system files and/or user-generated data.
  • PDA personal digital assistant
  • a bus system may be comprised of one or more buses, such as a system bus, an I/O bus and a PCI bus. Of course the bus system may be implemented using any type of communications fabric or architecture that provides for a transfer of data between different components or devices attached to the fabric or architecture.
  • a communications unit may include one or more devices used to transmit and receive data, such as a modem or a network adapter.
  • a memory may be, for example, main memory 208 or a cache such as found in north bridge and memory controller hub 202 .
  • a processing unit may include one or more processors or CPUs.
  • processors or CPUs may include one or more processors or CPUs.
  • FIGS. 1-2 and above-described examples are not meant to imply architectural limitations.
  • data processing system 200 also may be a tablet computer, laptop computer, or telephone device in addition to taking the form of a PDA.
  • business processes are computer processes which are often customized to a particular company's needs and typically involve some amount of human interaction. Since most organizations classify their personnel into different organizational roles based on the tasks performed by each individual, the actions of any particular individual may be restricted to those operations that are appropriate for the individual's role in the organization based on policy rules.
  • the process of binding a task to an individual or organizational role (“staff resolution”) comprises deciding which user in the organization is allowed to perform the activity in a business process.
  • the illustrative embodiments provide a dynamic method and system for binding a business process activity to a corresponding human entity or organizational role.
  • the illustrative embodiments decouple the policy-based authorization from the process engine and externalize this authorization in a policy-based access control system.
  • binding is implemented at deployment time through the policy-based access control system.
  • the dynamic process in the illustrative embodiments does not need to rely on definitions created at development time to implement the binding process, and thus the process avoids the static nature of existing staff resolution techniques.
  • implementing the binding process at deployment time in the access control system shields a user from having to re-build and re-deploy a business process when a change occurs in the underlying definitions which enable staff resolution.
  • the dynamic staff resolution process described in the illustrative embodiments provides several advantages over existing staff resolution techniques. For instance, with the illustrative embodiments, the binding of human entities to staff activities of a process is completely dynamic and is process-independent. Existing staff resolution techniques implement this binding as part of the process logic. Thus, a business process developer using the illustrative embodiments may focus solely on the business process logic at development time, rather than having to be concerned over binding of staff activities to human entities.
  • human intervention during business process activities may be subject to various rules. For instance, a particular approval process may require the approval of an entire set of persons exercising a particular role or a subset thereof. Similarly, another policy may render the tasks to an automatic approval based on the satisfaction of pre-set conditions.
  • the binding in the illustrative embodiments is delegated to an access control system, roles, users and deciding rules may be updated at deployment time to accommodate the needs of the organization.
  • the staff service component in products such as Websphere Process Choreographer becomes a very light-weight component of the process engine, as the staff service component simply acts as an interface to the underlying access control system.
  • FIG. 3 is a block diagram of exemplary components for implementing the policy-based access control of business process activities in accordance with the illustrative embodiments.
  • FIG. 3 illustrates how the binding of human entities to business process activities is implemented within an access control system.
  • Data processing system 300 in this illustrative example comprises business process engine 302 , access control interface 304 , and access control system 306 .
  • Business process engine 302 is a process server, which may be implemented as server 104 or 106 in FIG. 1 .
  • Business process engine 302 contains the runtime components necessary to execute a business process, and interprets the business processes defined by a business process developer in order to execute and manage business transactions.
  • Business process engine 302 oversees the business transactions in the data processing system by reminding an individual or group participant of their assigned staff activities, such as via a calendar or email program.
  • Business process engine 302 also may act as a client device to access control system 306 .
  • Access control interface 304 allows business process engine 302 to interface with external systems.
  • a JavaTM Authorization Contract for Container (JACC) interface is used as the access control interface 304 , although other appropriate interfaces may also be used.
  • JACC provides the ability to delegate access decisions to an external provider, such as access control system 306 .
  • Business process engine 302 is interfaced via JACC to access control system 306 .
  • Access control system 306 is an authorization provider external to business process engine 302 which receives information about a user security context and determines whether any activities are assigned to the user. Access control system 306 may be located on any server 104 or 106 in FIG. 1 . Access control system 306 protects resources (business process activities) in the system by making them available to users who are identified as assigned to those resources. Access control system 306 may include a user registry, such as a corporate LDAP server or a database, comprising user and group/role information. Resources may be defined and mapped to particular users and roles within the organization to constrain resource access based on these mappings. This mapping may be to one or more individual users by name, to one or more defined groups of users, or any combination of these. These mappings may be stored as role-based access control lists (ACLs) within access control system 306 .
  • An example of an access control system is Tivoli? Access Manager, a product of International Business Machines Corporation.
  • a process development tool outputs only identification information of the staff activities 310 contained in a business process.
  • identification information of each staff activity 310 may be output in a tuple, such as:
  • Business process engine 302 then exports the identification information of a staff activity 310 in tuple form, and imported to an authorization policy engine in access control system 306 .
  • the authorization policy engine in access control system 306 comprises policy information required to determine the binding of each staff activity to a corresponding human entity or an organizational role, or to a rule based policy statement when access control system 306 supports such rules.
  • Access control system 306 then stores the tuple in access policy store 312 . It should be noted that storing staff activity information within access control system 306 is a departure from existing staff resolution mechanisms which persist this staff activity information in their own control structures, rather than in a control system external to access control system 306 .
  • Access policy store 312 also comprises role-based access control lists (ACLs), which access control system 306 uses to form the bindings between the staff activities and the human entities or organizational roles based on the information in the tuple.
  • ACLs role-based access control lists
  • business process engine 302 may invoke access control system 306 by passing the user security context (e.g. an authenticated identity and its group/role information) to access control system 306 .
  • user security context e.g. an authenticated identity and its group/role information
  • Access control system 306 queries the access control lists (ACLs) in access policy store 312 against the user information and returns ? Process Name, Activity Name> of each activity that is awaiting the user's intervention.
  • Business process engine 302 provides this user information to access control system 306 and allows access control system 306 to make an access decision (i.e., a determination whether the user has any pending staff activities assigned).
  • Access control system 306 provides the pending staff activity information to business process engine 302 , which in turn provides the activity information to the user.
  • Access control system 306 may also determine whether or not access to a resource may be given to an entity by first determining whether the entity has access to the process activity template. For example, a change requester may instantiate a change management process only if the requester is allowed access to the underlying change management process template.
  • a process template is a generic process definition that has not yet been customized to a particular environment, such as a change management process template in which staff activities have not yet been defined.
  • FIG. 4 is a flowchart of a process for dynamically binding business process activities to human entities in accordance with the illustrative embodiments.
  • the process described in FIG. 4 may be implemented in a data processing system, such as data processing system 300 in FIG. 3 .
  • the process begins at development time, where a process development tool used to define a process outputs information about all of the tool's staff activities (step 402 ).
  • This information may comprise identification information about the staff activities in tuple form, which includes an identifier of a business process, an identifier of a particular staff activity in the process, and the business objects which will be affected by the actions of the staff activity.
  • the process server then exports the identification information containing information about the staff activity in tuple form to an authorization policy engine in an external access control system (step 404 ).
  • the access control system comprises policy information required to determine the binding of each business activity to a corresponding human entity or an organizational role.
  • the external access control system then imports and stores the identification information in an access policy store within the access control system (step 406 ).
  • the business process instructs the external access control system to resolve the staff activities in the business process which have no dependency on other staff activities (step 408 ).
  • resolution means assigning staff activities to the entitled human entities based on the access policy of the access control system.
  • the resolved staff activities are communicated back from the access control system to the process server (step 410 ).
  • the process server When a user authenticates (logs on) to the process server and checks if the user has a pending staff activity, the process server provides the user with those staff activities which were assigned to the user by the access control system based on the access policy (step 412 ). For example, the process server may provide the business process name and the business activity name to the user which are pending the user's intervention. The user may then perform the business activities dynamically assigned to the user by the access control system (step 414 ).
  • step 416 A determination is then made as to whether there are any other staff activities in the business process which should be resolved (step 416 ). If there are more staff activities to be resolved (‘yes’ output of step 416 ), the process loops back to step 408 . If there are no more staff activities to be resolved (‘no’ output of step 416 ), the process terminates thereafter.
  • the invention can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment containing both hardware and software elements.
  • the invention is implemented in software, which includes but is not limited to firmware, resident software, microcode, etc.
  • the invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system.
  • a computer-usable or computer readable medium can be any tangible apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
  • the medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium.
  • Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk.
  • Current examples of optical disks include compact disk—read only memory (CD-ROM), compact disk—read/write (CD-R/W) and DVD.
  • a data processing system suitable for storing and/or executing program code will include at least one processor coupled directly or indirectly to memory elements through a system bus.
  • the memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution.
  • I/O devices including but not limited to keyboards, displays, pointing devices, etc.
  • I/O controllers can be coupled to the system either directly or through intervening I/O controllers.
  • Network adapters may also be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices through intervening private or public networks.
  • Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Game Theory and Decision Science (AREA)
  • Development Economics (AREA)
  • Quality & Reliability (AREA)
  • General Business, Economics & Management (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Educational Administration (AREA)
  • Tourism & Hospitality (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Animal Behavior & Ethology (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A computer implemented method, data processing system, and computer program product for dynamically binding business process activities to human entities at deployment time. Identification information about a staff activity in a business process is received from a process server at an access control system external to the process server. Responsive to initiation of the business process, the staff activity is resolved at the access control system at runtime by assigning the staff activity to a user based on an access policy of the access control system to form a staff activity assignment. The staff activity assignment is communicated from the access control system to the process server. The process allows the development of the business process to be entirely decoupled from staff activity resolution at runtime.

Description

    BACKGROUND OF THE INVENTION
  • 百度   由国家工商总局广告监督管理司、消费者报社和中国消费网联合举办的首届典型违法广告形式漫画大奖赛近日圆满落幕。
    1. Field of the Invention
  • The present invention relates generally to an improved data processing system, and in particular, to dynamically binding business process activities to human entities at deployment time.
  • 2. Description of the Related Art
  • Business processes define a set of coordinated tasks and activities that lead to accomplishing specific goals of an organization. Business processes may be implemented in a proprietary software language or may be implemented using an industry standard language, such as the Business Process Execution Language (BPEL). A business process may include activities which comprise automated tasks, which are performed by computers or other machines, as well as manual activities, which require some form of human intervention. One example of an activity requiring human intervention is a process in which a request for a change is received, and a human entity must assess the impact and give approval of the requested change prior to the change being implemented. Activities requiring human intervention are often called “staff activities”.
  • Most organizations classify their personnel into different roles based on the activities performed by each user. For example, a service provider may assign different individuals to manage different customers, different regions, and different groups of devices. In addition, users with different skill sets may assume different duties within the organization. Policy rules may be used to restrict the actions of any particular user to those operations that are appropriate for the user's role. For instance, in a typical network management system of possibly thousands of devices, the system may contain a security policy for the network administrator, for example, by assigning a specific class of privileges to the administrator based on the administrator's group. Within a runtime environment, the administrator can attempt to perform certain administrative functions that are not allowed to be performed by the average user. For example, a particular administrator may be responsible for maintaining a particular subnet of devices with a range of IP addresses between X.Y.Z.0 and X.Y.Z.255. At some point, the administrator may log into the management system and attempt to manage a device at address X.Y.Z.5. The network management system uses the security policy to determine whether to allow the administrator to perform the management function on that particular device. The process of deciding which users are allowed to perform specific activities in a business process is called “staff resolution”.
  • Current technologies include specialized components which allow for staff resolution of business activities to the respective human entities in the organization's personnel. An example of a product capable of staff resolution is Websphere? Application Server Enterprise Process Choreographer, also called Websphere Process Server, which is a product of International Business Machines Corporation. The staff service component in the Process Choreographer and in other current technologies is provided by and supported by the process engine of an application server. In addition, the definitions (i.e., information used for binding a particular role to an activity to be performed) that enable staff resolution using the current technologies are created at process development time. Since the human entities responsible for performing business activities are defined at development time, these definitions represent a very static aspect of such business processes. Any changes to the definitions will require rebuilding and redeploying the business process. The rebuilding of business processes are generally not feasible in a customer environment where only the binaries of these processes are available to the customer. Additionally, the customer may not want to invest in the skills which are necessary to implement these changes. Although there are sophisticated scenarios in which some flexibility is built into a business process by way of parameterizing role to business activity, the binding of business activities to roles and human entities still remains static in nature, in that no additional entities or roles in an organization may be further added to the business process without having to rebuild the process.
  • SUMMARY OF THE INVENTION
  • The illustrative embodiments provide a computer implemented method, data processing system, and computer program product for dynamically binding business process activities to human entities at deployment time. Identification information about a staff activity in a business process is received from a process server at an access control system external to the process server. Responsive to initiation of the business process, the staff activity is resolved at the access control system at runtime by assigning the staff activity to a user based on an access policy of the access control system to form a staff activity assignment. The staff activity assignment is communicated from the access control system to the process server. The process in the illustrative embodiments allows the development of the business process to be entirely decoupled from staff activity resolution at runtime.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The novel features believed characteristic of the invention are set forth in the appended claims. The invention itself, however, as well as a preferred mode of use, further objectives and advantages thereof, will best be understood by reference to the following detailed description of an illustrative embodiment when read in conjunction with the accompanying drawings, wherein:
  • FIG. 1 depicts a pictorial representation of a distributed data processing system in which the illustrative embodiments may be implemented;
  • FIG. 2 is a block diagram of a data processing system in which the illustrative embodiments may be implemented;
  • FIG. 3 is a block diagram of exemplary components for implementing the policy-based access control of business process activities in accordance with the illustrative embodiments; and
  • FIG. 4 is a flowchart of a process for dynamically binding business process activities to human entities in accordance with the illustrative embodiments.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
  • With reference now to the figures and in particular with reference to FIGS. 1-2, exemplary diagrams of data processing environments are provided in which illustrative embodiments may be implemented. It should be appreciated that FIGS. 1-2 are only exemplary and are not intended to assert or imply any limitation with regard to the environments in which different embodiments may be implemented. Many modifications to the depicted environments may be made.
  • FIG. 1 depicts a pictorial representation of a network of data processing systems in which illustrative embodiments may be implemented. Network data processing system 100 is a network of computers in which the illustrative embodiments may be implemented. Network data processing system 100 contains network 102, which is the medium used to provide communications links between various devices and computers connected together within network data processing system 100. Network 102 may include connections, such as wire, wireless communication links, or fiber optic cables.
  • In the depicted example, server 104 and server 106 connect to network 102 along with storage unit 108. In addition, clients 110, 112, and 114 connect to network 102. Clients 110, 112, and 114 may be, for example, personal computers or network computers. In the depicted example, server 104 provides data, such as boot files, operating system images, and applications to clients 110, 112, and 114. Clients 110, 112, and 114 are clients to server 104 in this example. Network data processing system 100 may include additional servers, clients, and other devices not shown.
  • In the depicted example, network data processing system 100 is the Internet with network 102 representing a worldwide collection of networks and gateways that use the Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols to communicate with one another. At the heart of the Internet is a backbone of high-speed data communication lines between major nodes or host computers, consisting of thousands of commercial, governmental, educational and other computer systems that route data and messages. Of course, network data processing system 100 also may be implemented as a number of different types of networks, such as for example, an intranet, a local area network (LAN), or a wide area network (WAN). FIG. 1 is intended as an example, and not as an architectural limitation for the different illustrative embodiments.
  • With reference now to FIG. 2, a block diagram of a data processing system is shown in which illustrative embodiments may be implemented. Data processing system 200 is an example of a computer, such as server 104 or client 110 in FIG. 1, in which computer usable program code or instructions implementing the processes may be located for the illustrative embodiments.
  • In the depicted example, data processing system 200 employs a hub architecture including a north bridge and memory controller hub (NB/MCH) 202 and a south bridge and input/output (I/O) controller hub (SB/ICH) 204. Processing unit 206, main memory 208, and graphics processor 210 are coupled to north bridge and memory controller hub 202. Processing unit 206 may contain one or more processors and even may be implemented using one or more heterogeneous processor systems. Graphics processor 210 may be coupled to the NB/MCH through an accelerated graphics port (AGP), for example.
  • In the depicted example, local area network (LAN) adapter 212 is coupled to south bridge and I/O controller hub 204 and audio adapter 216, keyboard and mouse adapter 220, modem 222, read only memory (ROM) 224, universal serial bus (USB) and other ports 232, and PCI/PCIe devices 234 are coupled to south bridge and I/O controller hub 204 through bus 238, and hard disk drive (HDD) 226 and CD-ROM 230 are coupled to south bridge and I/O controller hub 204 through bus 240. PCI/PCIe devices may include, for example, Ethernet adapters, add-in cards, and PC cards for notebook computers. PCI uses a card bus controller, while PCIe does not. ROM 224 may be, for example, a flash binary input/output system (BIOS). Hard disk drive 226 and CD-ROM 230 may use, for example, an integrated drive electronics (IDE) or serial advanced technology attachment (SATA) interface. A super I/O (SIO) device 236 may be coupled to south bridge and I/O controller hub 204.
  • An operating system runs on processing unit 206 and coordinates and provides control of various components within data processing system 200 in FIG. 2. The operating system may be a commercially available operating system such as Microsoft? Windows? XP (Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both). An object oriented programming system, such as the Java? programming system, may run in conjunction with the operating system and provides calls to the operating system from Java? programs or applications executing on data processing system 200. Java? and all JavaT?-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
  • Instructions for the operating system, the object-oriented programming system, and applications or programs are located on storage devices, such as hard disk drive 226, and may be loaded into main memory 208 for execution by processing unit 206. The processes of the illustrative embodiments may be performed by processing unit 206 using computer implemented instructions, which may be located in a memory such as, for example, main memory 208, read only memory 224, or in one or more peripheral devices.
  • The hardware in FIGS. 1-2 may vary depending on the implementation. Other internal hardware or peripheral devices, such as flash memory, equivalent non-volatile memory, or optical disk drives and the like, may be used in addition to or in place of the hardware depicted in FIGS. 1-2. Also, the processes of the illustrative embodiments may be applied to a multiprocessor data processing system.
  • In some illustrative examples, data processing system 200 may be a personal digital assistant (PDA), which is generally configured with flash memory to provide non-volatile memory for storing operating system files and/or user-generated data. A bus system may be comprised of one or more buses, such as a system bus, an I/O bus and a PCI bus. Of course the bus system may be implemented using any type of communications fabric or architecture that provides for a transfer of data between different components or devices attached to the fabric or architecture. A communications unit may include one or more devices used to transmit and receive data, such as a modem or a network adapter. A memory may be, for example, main memory 208 or a cache such as found in north bridge and memory controller hub 202. A processing unit may include one or more processors or CPUs. The depicted examples in FIGS. 1-2 and above-described examples are not meant to imply architectural limitations. For example, data processing system 200 also may be a tablet computer, laptop computer, or telephone device in addition to taking the form of a PDA.
  • As previously mentioned, certain computer processes are often termed “business processes”, as these business processes are computer processes which are often customized to a particular company's needs and typically involve some amount of human interaction. Since most organizations classify their personnel into different organizational roles based on the tasks performed by each individual, the actions of any particular individual may be restricted to those operations that are appropriate for the individual's role in the organization based on policy rules. The process of binding a task to an individual or organizational role (“staff resolution”) comprises deciding which user in the organization is allowed to perform the activity in a business process.
  • The illustrative embodiments provide a dynamic method and system for binding a business process activity to a corresponding human entity or organizational role. In contrast with existing staff resolution techniques, such as those offered by Websphere Process Choreographer, which are provided by and supported by the process engine of the application server, the illustrative embodiments decouple the policy-based authorization from the process engine and externalize this authorization in a policy-based access control system. In addition, with the illustrative embodiments, binding is implemented at deployment time through the policy-based access control system. By externalizing the assignment of business process activities to organizational roles or human entities to the access control system, the dynamic process in the illustrative embodiments does not need to rely on definitions created at development time to implement the binding process, and thus the process avoids the static nature of existing staff resolution techniques. In addition, implementing the binding process at deployment time in the access control system shields a user from having to re-build and re-deploy a business process when a change occurs in the underlying definitions which enable staff resolution.
  • The dynamic staff resolution process described in the illustrative embodiments provides several advantages over existing staff resolution techniques. For instance, with the illustrative embodiments, the binding of human entities to staff activities of a process is completely dynamic and is process-independent. Existing staff resolution techniques implement this binding as part of the process logic. Thus, a business process developer using the illustrative embodiments may focus solely on the business process logic at development time, rather than having to be concerned over binding of staff activities to human entities. In addition, human intervention during business process activities may be subject to various rules. For instance, a particular approval process may require the approval of an entire set of persons exercising a particular role or a subset thereof. Similarly, another policy may render the tasks to an automatic approval based on the satisfaction of pre-set conditions. Since the binding in the illustrative embodiments is delegated to an access control system, roles, users and deciding rules may be updated at deployment time to accommodate the needs of the organization. Furthermore, with the illustrative embodiments, the staff service component in products such as Websphere Process Choreographer becomes a very light-weight component of the process engine, as the staff service component simply acts as an interface to the underlying access control system.
  • FIG. 3 is a block diagram of exemplary components for implementing the policy-based access control of business process activities in accordance with the illustrative embodiments. In particular, FIG. 3 illustrates how the binding of human entities to business process activities is implemented within an access control system.
  • Data processing system 300 in this illustrative example comprises business process engine 302, access control interface 304, and access control system 306. Business process engine 302 is a process server, which may be implemented as server 104 or 106 in FIG. 1. Business process engine 302 contains the runtime components necessary to execute a business process, and interprets the business processes defined by a business process developer in order to execute and manage business transactions. Business process engine 302 oversees the business transactions in the data processing system by reminding an individual or group participant of their assigned staff activities, such as via a calendar or email program. Business process engine 302 also may act as a client device to access control system 306.
  • Access control interface 304 allows business process engine 302 to interface with external systems. In this illustrative example, a Java? Authorization Contract for Container (JACC) interface is used as the access control interface 304, although other appropriate interfaces may also be used. JACC provides the ability to delegate access decisions to an external provider, such as access control system 306. Business process engine 302 is interfaced via JACC to access control system 306.
  • Access control system 306 is an authorization provider external to business process engine 302 which receives information about a user security context and determines whether any activities are assigned to the user. Access control system 306 may be located on any server 104 or 106 in FIG. 1. Access control system 306 protects resources (business process activities) in the system by making them available to users who are identified as assigned to those resources. Access control system 306 may include a user registry, such as a corporate LDAP server or a database, comprising user and group/role information. Resources may be defined and mapped to particular users and roles within the organization to constrain resource access based on these mappings. This mapping may be to one or more individual users by name, to one or more defined groups of users, or any combination of these. These mappings may be stored as role-based access control lists (ACLs) within access control system 306. An example of an access control system is Tivoli? Access Manager, a product of International Business Machines Corporation.
  • The binding of staff activities and human entities or organizational roles in the illustrative embodiments occurs in a dynamic, rather than static, fashion. At process development time 308, a process development tool outputs only identification information of the staff activities 310 contained in a business process. For example, identification information of each staff activity 310 may be output in a tuple, such as:
      • <Process Name-Identifier, Activity Name-Identifier, Business Object>.
        The process name identification and activity name identification may be obtained from business process engine 302. The business object refers to the resource(s) that will be affected by the actions of the staff activity. Examples of resources which may be affected include, among others, both physical resources such as computer systems, machines, and equipment, and logical entities such as customer records, accounts, and orders.
  • Business process engine 302 then exports the identification information of a staff activity 310 in tuple form, and imported to an authorization policy engine in access control system 306. The authorization policy engine in access control system 306 comprises policy information required to determine the binding of each staff activity to a corresponding human entity or an organizational role, or to a rule based policy statement when access control system 306 supports such rules.
  • Access control system 306 then stores the tuple in access policy store 312. It should be noted that storing staff activity information within access control system 306 is a departure from existing staff resolution mechanisms which persist this staff activity information in their own control structures, rather than in a control system external to access control system 306. Access policy store 312 also comprises role-based access control lists (ACLs), which access control system 306 uses to form the bindings between the staff activities and the human entities or organizational roles based on the information in the tuple.
  • When a particular business process is instantiated, the business process runs until the process reaches a point in its workflow where a human intervention is required (i.e., reached a staff activity). When a user authenticates (logs on) to the system and checks if the user has a pending staff activity, the resolution of that staff activity to a human entity is performed by access control system 306, communicated back to business process engine 302, and provided to the requesting user. For instance, upon a user login, business process engine 302 may invoke access control system 306 by passing the user security context (e.g. an authenticated identity and its group/role information) to access control system 306. Access control system 306 queries the access control lists (ACLs) in access policy store 312 against the user information and returns <Process Name, Activity Name> of each activity that is awaiting the user's intervention. Business process engine 302 provides this user information to access control system 306 and allows access control system 306 to make an access decision (i.e., a determination whether the user has any pending staff activities assigned). Access control system 306 provides the pending staff activity information to business process engine 302, which in turn provides the activity information to the user.
  • Access control system 306 may also determine whether or not access to a resource may be given to an entity by first determining whether the entity has access to the process activity template. For example, a change requester may instantiate a change management process only if the requester is allowed access to the underlying change management process template. A process template is a generic process definition that has not yet been customized to a particular environment, such as a change management process template in which staff activities have not yet been defined.
  • FIG. 4 is a flowchart of a process for dynamically binding business process activities to human entities in accordance with the illustrative embodiments. The process described in FIG. 4 may be implemented in a data processing system, such as data processing system 300 in FIG. 3. The process begins at development time, where a process development tool used to define a process outputs information about all of the tool's staff activities (step 402). This information may comprise identification information about the staff activities in tuple form, which includes an identifier of a business process, an identifier of a particular staff activity in the process, and the business objects which will be affected by the actions of the staff activity.
  • The process server then exports the identification information containing information about the staff activity in tuple form to an authorization policy engine in an external access control system (step 404). The access control system comprises policy information required to determine the binding of each business activity to a corresponding human entity or an organizational role. The external access control system then imports and stores the identification information in an access policy store within the access control system (step 406).
  • When a business process is initiated, the business process instructs the external access control system to resolve the staff activities in the business process which have no dependency on other staff activities (step 408). In this instance, resolution means assigning staff activities to the entitled human entities based on the access policy of the access control system. The resolved staff activities are communicated back from the access control system to the process server (step 410).
  • When a user authenticates (logs on) to the process server and checks if the user has a pending staff activity, the process server provides the user with those staff activities which were assigned to the user by the access control system based on the access policy (step 412). For example, the process server may provide the business process name and the business activity name to the user which are pending the user's intervention. The user may then perform the business activities dynamically assigned to the user by the access control system (step 414).
  • A determination is then made as to whether there are any other staff activities in the business process which should be resolved (step 416). If there are more staff activities to be resolved (‘yes’ output of step 416), the process loops back to step 408. If there are no more staff activities to be resolved (‘no’ output of step 416), the process terminates thereafter.
  • The invention can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment containing both hardware and software elements. In a preferred embodiment, the invention is implemented in software, which includes but is not limited to firmware, resident software, microcode, etc.
  • Furthermore, the invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system. For the purposes of this description, a computer-usable or computer readable medium can be any tangible apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
  • The medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium. Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk. Current examples of optical disks include compact disk—read only memory (CD-ROM), compact disk—read/write (CD-R/W) and DVD.
  • A data processing system suitable for storing and/or executing program code will include at least one processor coupled directly or indirectly to memory elements through a system bus. The memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution.
  • Input/output or I/O devices (including but not limited to keyboards, displays, pointing devices, etc.) can be coupled to the system either directly or through intervening I/O controllers.
  • Network adapters may also be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices through intervening private or public networks. Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.
  • The description of the present invention has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art. The embodiment was chosen and described in order to best explain the principles of the invention, the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.

Claims (20)

1. A computer implemented method for dynamically assigning a staff activity to a human entity or organizational role, the computer implemented method comprising:
receiving, from a process server, identification information about a staff activity in a business process at an access control system external to the process server;
responsive to initiation of the business process, resolving the staff activity at the access control system at runtime by assigning the staff activity to a user based on an access policy of the access control system to form a staff activity assignment; and
communicating the staff activity assignment from the access control system to the process server;
wherein the receiving, resolving, and communicating steps enable development of the business process to be decoupled from staff activity resolution at runtime.
2. The computer implemented method of claim 1, wherein the process server provides the staff activity assignment to the user.
3. The computer implemented method of claim 1, wherein the staff activity assignment is provided to the user in response to the user logging onto the process server.
4. The computer implemented method of claim 1, wherein resolving the staff activity at the access control system further includes:
examining membership of the user in an organizational group or role; and
assigning the staff activity to the user based on the user's membership.
5. The computer implemented method of claim 1, wherein the user is one of a human entity, organizational group, or organizational role.
6. The computer implemented method of claim 1, wherein the identification information is defined by an output from a process development tool.
7. The computer implemented method of claim 1, wherein the identification information is a tuple.
8. The computer implemented method of claim 7, wherein the tuple comprises an identifier of the business process, an identifier of the staff activity in the business process, and business objects affected by actions of the staff activity.
9. The computer implemented method of claim 1, wherein an authorization policy engine in the access control system receives the identification information from the process server.
10. A data processing system for dynamically assigning a staff activity to a human entity or organizational role, the data processing system comprising:
a bus;
a storage device connected to the bus, wherein the storage device contains computer usable code;
at least one managed device connected to the bus;
a communications unit connected to the bus; and
a processing unit connected to the bus, wherein the processing unit executes the computer usable code to receive, from a process server, identification information about a staff activity in a business process at an access control system external to the process server; resolve the staff activity at the access control system at runtime by assigning the staff activity to a user based on an access policy of the access control system to form a staff activity assignment in response to initiation of the business process, and communicate the staff activity assignment from the access control system to the process server, wherein the computer usable code to receive, resolve, and communicate enable development of the business process to be decoupled from staff activity resolution at runtime.
11. The data processing system of claim 10, wherein the processing unit further executes the computer usable code to provide the staff activity assignment to the user.
12. A computer program product for dynamically assigning a staff activity to a human entity or organizational role, the computer program product comprising:
a computer usable medium having computer usable program code tangibly embodied thereon, the computer usable program code comprising:
computer usable program code for receiving, from a process server, identification information about a staff activity in a business process at an access control system external to the process server;
computer usable program code for resolving the staff activity at the access control system at runtime by assigning the staff activity to a user based on an access policy of the access control system to form a staff activity assignment in response to initiation of the business process; and
computer usable program code for communicating the staff activity assignment from the access control system to the process server;
wherein the computer usable program code for receiving, resolving, and communicating enable development of the business process to be decoupled from staff activity resolution at runtime.
13. The computer program product of claim 12, further comprising:
computer usable program code for providing the staff activity assignment to the user.
14. The computer program product of claim 12, wherein the staff activity assignment is provided to the user in response to the user logging onto the process server.
15. The computer program product of claim 12, wherein the computer usable program code for resolving the staff activity at the access control system further includes:
computer usable program code for examining membership of the user in an organizational group or role; and
computer usable program code for assigning the staff activity to the user based on the user's membership.
16. The computer program product of claim 12, wherein the user is one of a human entity, organizational group, or organizational role.
17. The computer program product of claim 12, wherein the identification information is defined by an output from a process development tool.
18. The computer program product of claim 12, wherein the identification information is a tuple.
19. The computer program product of claim 18, wherein the tuple comprises an identifier of the business process, an identifier of the staff activity in the business process, and business objects affected by actions of the staff activity.
20. The computer program product of claim 12, wherein an authorization policy engine in the access control system receives the identification information from the process server.
US11/738,794 2025-08-05 2025-08-05 Policy-based access control approach to staff activities of a business process Expired - Fee Related US8904391B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/738,794 US8904391B2 (en) 2025-08-05 2025-08-05 Policy-based access control approach to staff activities of a business process

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/738,794 US8904391B2 (en) 2025-08-05 2025-08-05 Policy-based access control approach to staff activities of a business process

Publications (2)

Publication Number Publication Date
US20080263060A1 true US20080263060A1 (en) 2025-08-05
US8904391B2 US8904391B2 (en) 2025-08-05

Family

ID=39873282

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/738,794 Expired - Fee Related US8904391B2 (en) 2025-08-05 2025-08-05 Policy-based access control approach to staff activities of a business process

Country Status (1)

Country Link
US (1) US8904391B2 (en)

Cited By (8)

* Cited by examiner, ? Cited by third party
Publication number Priority date Publication date Assignee Title
US20110302290A1 (en) * 2025-08-05 2025-08-05 Novell, Inc. System and method for managing changes in a network datacenter
FR2964770A1 (en) * 2025-08-05 2025-08-05 Evidian Method for processing e.g. permission or roll demand, made by person of enterprise in workflow engine of information system to allow person to have access to color printer, involves sending response to engine via authorization system
US20130346134A1 (en) * 2025-08-05 2025-08-05 Siemens Enterprise Communications Gmbh & Co. Kg System and method for coordinating and controlling production processes and inter-related decision making process
US20140129268A1 (en) * 2025-08-05 2025-08-05 Oracle International Corporation Role discovery using privilege cluster analysis
US20140164052A1 (en) * 2025-08-05 2025-08-05 Hartford Fire Insurance Company System and Method for Managing and Displaying Company Policy Data
US20150051957A1 (en) * 2025-08-05 2025-08-05 Oracle International Corporation Measuring customer experience value
US9760734B2 (en) * 2025-08-05 2025-08-05 Sap Se Catalog-based user authorization to access to multiple applications
US20180067979A1 (en) * 2025-08-05 2025-08-05 Salesforce.Com, Inc. System, method and computer program product for maintaining data stored in a data structure

Citations (62)

* Cited by examiner, ? Cited by third party
Publication number Priority date Publication date Assignee Title
US5369702A (en) * 2025-08-05 2025-08-05 Tecsec Incorporated Distributed cryptographic object method
US5764958A (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Method and apparatus for creating dynamic roles with a system object model
US5911143A (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Method and system for advanced role-based access control in distributed and centralized computer systems
US5974420A (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Information exchange operator for a tuplespace
US6088679A (en) * 2025-08-05 2025-08-05 The United States Of America As Represented By The Secretary Of Commerce Workflow management employing role-based access control
US6141720A (en) * 2025-08-05 2025-08-05 Cabletron Systems, Inc. Method and apparatus for coordination of a shared object in a distributed system
US6202066B1 (en) * 2025-08-05 2025-08-05 The United States Of America As Represented By The Secretary Of Commerce Implementation of role/group permission association using object access type
US20010001864A1 (en) * 2025-08-05 2025-08-05 Page John D. Trackpoint-based computer-implemented systems and methods for facilitating collaborative project development and communication
US20010047485A1 (en) * 2025-08-05 2025-08-05 Daniel Brown Computer security system
US20020147801A1 (en) * 2025-08-05 2025-08-05 Gullotta Tony J. System and method for provisioning resources to users based on policies, roles, organizational information, and attributes
US20020178119A1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Method and system for a role-based access control model with active roles
US20030018519A1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Computerized method and system for maturity assessment of business processes
US6529909B1 (en) * 2025-08-05 2025-08-05 Accenture Llp Method for translating an object attribute converter in an information services patterns environment
US20030046576A1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Role-permission model for security policy administration and enforcement
US20030084168A1 (en) * 2025-08-05 2025-08-05 Erickson John S. Policy enforcement and access control for distributed networked services
US20030112666A1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Security and authorization development tools
US6751619B1 (en) * 2025-08-05 2025-08-05 Microsoft Corporation Methods and apparatus for tuple management in data processing system
US20040128186A1 (en) * 2025-08-05 2025-08-05 Jodi Breslin System and method for managing risks associated with outside service providers
US20040205342A1 (en) * 2025-08-05 2025-08-05 Roegner Michael W. Method and system for dynamically implementing an enterprise resource policy
US20050038006A1 (en) * 2025-08-05 2025-08-05 Shangold Gary A. Triphasic oral contraceptive
US20050044227A1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Reservation of TCP/UDP ports using UID, GID or process name
US20050132048A1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Role-based views access to a workflow weblog
US20050138031A1 (en) * 2025-08-05 2025-08-05 Wefers Wolfgang M. Systems and methods for assigning task-oriented roles to users
US20050165809A1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Technique for improving staff queries in a workflow management system
US20050182773A1 (en) * 2025-08-05 2025-08-05 Feinsmith Jason B. Machine-implemented activity management system using asynchronously shared activity data objects and journal data items
US20050203757A1 (en) * 2025-08-05 2025-08-05 Hui Lei System and method for pervasive enablement of business processes
US20050267765A1 (en) * 2025-08-05 2025-08-05 Jun-Jang Jeng Apparatus and method for policy-driven business process exception handling
US20060005124A1 (en) * 2025-08-05 2025-08-05 Ewald Speicher User interface for complex process implementation
US20060004783A1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Dynamic binding of principal services in a cross-enterprise business process management system
US20060009991A1 (en) * 2025-08-05 2025-08-05 Jun-Jang Jeng Method and apparatus for using meta-rules to support dynamic rule-based business systems
US6988139B1 (en) * 2025-08-05 2025-08-05 Microsoft Corporation Distributed computing of a job corresponding to a plurality of predefined tasks
US20060036869A1 (en) * 2025-08-05 2025-08-05 Bill Faught Methods and systems that provide user access to computer resources with controlled user access rights
US20060047558A1 (en) * 2025-08-05 2025-08-05 Norimasa Uchiyama Method, system, and computer program product for assigning personnel to project tasks
US20060089938A1 (en) * 2025-08-05 2025-08-05 Leonard Glenda A Distributed scalable policy based content management
US20060101019A1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Systems and methods of access control enabling ownership of access control lists to users or groups
US20060106825A1 (en) * 2025-08-05 2025-08-05 Matthew Cozzi Enterprise architecture analysis framework database
US20060111931A1 (en) * 2025-08-05 2025-08-05 General Electric Company Method for the use of and interaction with business system transfer functions
US20060247965A1 (en) * 2025-08-05 2025-08-05 Griffith Wm P Method of defining and monitoring processes
US20060268712A1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation System, method, and service for dynamically selecting an optimum message pathway
US20070033571A1 (en) * 2025-08-05 2025-08-05 Sap Ag Dynamic work center
US7185192B1 (en) * 2025-08-05 2025-08-05 Emc Corporation Methods and apparatus for controlling access to a resource
US20070211056A1 (en) * 2025-08-05 2025-08-05 Sudip Chakraborty Multi-dimensional data visualization
US20070239859A1 (en) * 2025-08-05 2025-08-05 Wilkinson Anthony J Method and system for providing virtualized application workspaces
US20070239998A1 (en) * 2025-08-05 2025-08-05 Medox Exchange, Inc. Dynamic binding of access and usage rights to computer-based resources
US7289964B1 (en) * 2025-08-05 2025-08-05 Accenture Llp System and method for transaction services patterns in a netcentric environment
US20070271381A1 (en) * 2025-08-05 2025-08-05 Joseph Skeffington Wholey Managing computing resources in graph-based computations
US20070283351A1 (en) * 2025-08-05 2025-08-05 Degenaro Louis R Unified job processing of interdependent heterogeneous tasks
US20070299795A1 (en) * 2025-08-05 2025-08-05 Microsoft Corporation Creating and managing activity-centric workflow
US20070300224A1 (en) * 2025-08-05 2025-08-05 Vijay Kumar Aggarwal Method and apparatus to modify a task within a set of tasks
US20080022370A1 (en) * 2025-08-05 2025-08-05 International Business Corporation System and method for role based access control in a content management system
US7340513B2 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Resource management method and system with rule based consistency check
US7373310B1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Workflow system matrix organization search engine
US20080222602A1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Declarative object identity using relation types
US20080256610A1 (en) * 2025-08-05 2025-08-05 Bea Systems, Inc. System and method for dynamic role association
US20080294599A1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Apparatus and method of semantic tuplespace system
US7469409B2 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Adaptive resource management method
US7523486B1 (en) * 2025-08-05 2025-08-05 Sprint Communications Company Lp User administration tool
US20090213860A1 (en) * 2025-08-05 2025-08-05 Huawei Technologies Co., Ltd. Method and device for service binding
US7610575B2 (en) * 2025-08-05 2025-08-05 Consona Crm Inc. System and method for the composition, generation, integration and execution of business processes over a network
US7676831B2 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Role-based access control management for multiple heterogeneous application components
US7793333B2 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Mobile authorization using policy based access control
US8024275B2 (en) * 2025-08-05 2025-08-05 Sap Ag Method and system for monitoring a business process

Family Cites Families (1)

* Cited by examiner, ? Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004109443A2 (en) 2025-08-05 2025-08-05 Liquid Machines, Inc. Managing data objects in dynamic, distributed and collaborative contexts

Patent Citations (71)

* Cited by examiner, ? Cited by third party
Publication number Priority date Publication date Assignee Title
US5369702A (en) * 2025-08-05 2025-08-05 Tecsec Incorporated Distributed cryptographic object method
US5911143A (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Method and system for advanced role-based access control in distributed and centralized computer systems
US5764958A (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Method and apparatus for creating dynamic roles with a system object model
US6510478B1 (en) * 2025-08-05 2025-08-05 Aprisma Management Technologies Inc. Method and apparatus for coordination of a shared object in a distributed system
US6141720A (en) * 2025-08-05 2025-08-05 Cabletron Systems, Inc. Method and apparatus for coordination of a shared object in a distributed system
US20010001864A1 (en) * 2025-08-05 2025-08-05 Page John D. Trackpoint-based computer-implemented systems and methods for facilitating collaborative project development and communication
US6202066B1 (en) * 2025-08-05 2025-08-05 The United States Of America As Represented By The Secretary Of Commerce Implementation of role/group permission association using object access type
US6088679A (en) * 2025-08-05 2025-08-05 The United States Of America As Represented By The Secretary Of Commerce Workflow management employing role-based access control
US5974420A (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Information exchange operator for a tuplespace
US20050038006A1 (en) * 2025-08-05 2025-08-05 Shangold Gary A. Triphasic oral contraceptive
US6529909B1 (en) * 2025-08-05 2025-08-05 Accenture Llp Method for translating an object attribute converter in an information services patterns environment
US7289964B1 (en) * 2025-08-05 2025-08-05 Accenture Llp System and method for transaction services patterns in a netcentric environment
US20010047485A1 (en) * 2025-08-05 2025-08-05 Daniel Brown Computer security system
US6751619B1 (en) * 2025-08-05 2025-08-05 Microsoft Corporation Methods and apparatus for tuple management in data processing system
US7373310B1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Workflow system matrix organization search engine
US20080222147A1 (en) * 2025-08-05 2025-08-05 Alexandre El Homsi Workflow system matrix organization search engine
US7185192B1 (en) * 2025-08-05 2025-08-05 Emc Corporation Methods and apparatus for controlling access to a resource
US20020147801A1 (en) * 2025-08-05 2025-08-05 Gullotta Tony J. System and method for provisioning resources to users based on policies, roles, organizational information, and attributes
US20020178119A1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Method and system for a role-based access control model with active roles
US20080256610A1 (en) * 2025-08-05 2025-08-05 Bea Systems, Inc. System and method for dynamic role association
US7823189B2 (en) * 2025-08-05 2025-08-05 Bea Systems, Inc. System and method for dynamic role association
US20030018519A1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Computerized method and system for maturity assessment of business processes
US20030046576A1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Role-permission model for security policy administration and enforcement
US20030084168A1 (en) * 2025-08-05 2025-08-05 Erickson John S. Policy enforcement and access control for distributed networked services
US20030112666A1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Security and authorization development tools
US6988139B1 (en) * 2025-08-05 2025-08-05 Microsoft Corporation Distributed computing of a job corresponding to a plurality of predefined tasks
US7340513B2 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Resource management method and system with rule based consistency check
US7469409B2 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Adaptive resource management method
US20040128186A1 (en) * 2025-08-05 2025-08-05 Jodi Breslin System and method for managing risks associated with outside service providers
US7610575B2 (en) * 2025-08-05 2025-08-05 Consona Crm Inc. System and method for the composition, generation, integration and execution of business processes over a network
US20040205342A1 (en) * 2025-08-05 2025-08-05 Roegner Michael W. Method and system for dynamically implementing an enterprise resource policy
US20060111931A1 (en) * 2025-08-05 2025-08-05 General Electric Company Method for the use of and interaction with business system transfer functions
US20050044227A1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Reservation of TCP/UDP ports using UID, GID or process name
US20050149375A1 (en) * 2025-08-05 2025-08-05 Wefers Wolfgang M. Systems and methods for handling and managing workflows
US20050138031A1 (en) * 2025-08-05 2025-08-05 Wefers Wolfgang M. Systems and methods for assigning task-oriented roles to users
US20050132048A1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Role-based views access to a workflow weblog
US20050165809A1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Technique for improving staff queries in a workflow management system
US7197502B2 (en) * 2025-08-05 2025-08-05 Friendly Polynomials, Inc. Machine-implemented activity management system using asynchronously shared activity data objects and journal data items
US20070150496A1 (en) * 2025-08-05 2025-08-05 Feinsmith Jason B Machine-implemented activity management system using asynchronously shared activity data objects and journal data items
US20050182773A1 (en) * 2025-08-05 2025-08-05 Feinsmith Jason B. Machine-implemented activity management system using asynchronously shared activity data objects and journal data items
US7523486B1 (en) * 2025-08-05 2025-08-05 Sprint Communications Company Lp User administration tool
US20050203757A1 (en) * 2025-08-05 2025-08-05 Hui Lei System and method for pervasive enablement of business processes
US20060004783A1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Dynamic binding of principal services in a cross-enterprise business process management system
US20060009991A1 (en) * 2025-08-05 2025-08-05 Jun-Jang Jeng Method and apparatus for using meta-rules to support dynamic rule-based business systems
US20050267765A1 (en) * 2025-08-05 2025-08-05 Jun-Jang Jeng Apparatus and method for policy-driven business process exception handling
US20060005124A1 (en) * 2025-08-05 2025-08-05 Ewald Speicher User interface for complex process implementation
US20060036869A1 (en) * 2025-08-05 2025-08-05 Bill Faught Methods and systems that provide user access to computer resources with controlled user access rights
US20060047558A1 (en) * 2025-08-05 2025-08-05 Norimasa Uchiyama Method, system, and computer program product for assigning personnel to project tasks
US20060089938A1 (en) * 2025-08-05 2025-08-05 Leonard Glenda A Distributed scalable policy based content management
US20060101019A1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Systems and methods of access control enabling ownership of access control lists to users or groups
US20060106825A1 (en) * 2025-08-05 2025-08-05 Matthew Cozzi Enterprise architecture analysis framework database
US7970729B2 (en) * 2025-08-05 2025-08-05 Sap Aktiengesellschaft Enterprise architecture analysis framework database
US20060247965A1 (en) * 2025-08-05 2025-08-05 Griffith Wm P Method of defining and monitoring processes
US20060268712A1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation System, method, and service for dynamically selecting an optimum message pathway
US7793333B2 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Mobile authorization using policy based access control
US20070033571A1 (en) * 2025-08-05 2025-08-05 Sap Ag Dynamic work center
US7676831B2 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Role-based access control management for multiple heterogeneous application components
US7779091B2 (en) * 2025-08-05 2025-08-05 Vmware, Inc. Method and system for providing virtualized application workspaces
US20080034071A1 (en) * 2025-08-05 2025-08-05 Wilkinson Anthony J Method and system for providing virtualized application workspaces
US20070239859A1 (en) * 2025-08-05 2025-08-05 Wilkinson Anthony J Method and system for providing virtualized application workspaces
US20070211056A1 (en) * 2025-08-05 2025-08-05 Sudip Chakraborty Multi-dimensional data visualization
US20070239998A1 (en) * 2025-08-05 2025-08-05 Medox Exchange, Inc. Dynamic binding of access and usage rights to computer-based resources
US20070271381A1 (en) * 2025-08-05 2025-08-05 Joseph Skeffington Wholey Managing computing resources in graph-based computations
US20070283351A1 (en) * 2025-08-05 2025-08-05 Degenaro Louis R Unified job processing of interdependent heterogeneous tasks
US20070300224A1 (en) * 2025-08-05 2025-08-05 Vijay Kumar Aggarwal Method and apparatus to modify a task within a set of tasks
US20070299795A1 (en) * 2025-08-05 2025-08-05 Microsoft Corporation Creating and managing activity-centric workflow
US20080022370A1 (en) * 2025-08-05 2025-08-05 International Business Corporation System and method for role based access control in a content management system
US20090213860A1 (en) * 2025-08-05 2025-08-05 Huawei Technologies Co., Ltd. Method and device for service binding
US20080222602A1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Declarative object identity using relation types
US8024275B2 (en) * 2025-08-05 2025-08-05 Sap Ag Method and system for monitoring a business process
US20080294599A1 (en) * 2025-08-05 2025-08-05 International Business Machines Corporation Apparatus and method of semantic tuplespace system

Cited By (16)

* Cited by examiner, ? Cited by third party
Publication number Priority date Publication date Assignee Title
US20180067979A1 (en) * 2025-08-05 2025-08-05 Salesforce.Com, Inc. System, method and computer program product for maintaining data stored in a data structure
US11609896B2 (en) * 2025-08-05 2025-08-05 Salesforce.Com, Inc. System, method and computer program product for maintaining data stored in a data structure
US20220107934A1 (en) * 2025-08-05 2025-08-05 Salesforce.Com, Inc. System, method and computer program product for maintaining data stored in a data structure
US11120003B2 (en) * 2025-08-05 2025-08-05 Salesforce.Com, Inc. System, method and computer program product for maintaining data stored in a data structure
US8745188B2 (en) * 2025-08-05 2025-08-05 Novell, Inc. System and method for managing changes in a network datacenter
US8769084B2 (en) 2025-08-05 2025-08-05 Novell, Inc. System and method for modeling interdependencies in a network datacenter
US9432277B2 (en) 2025-08-05 2025-08-05 Novell, Inc. System and method for modeling interdependencies in a network datacenter
US20110302290A1 (en) * 2025-08-05 2025-08-05 Novell, Inc. System and method for managing changes in a network datacenter
FR2964770A1 (en) * 2025-08-05 2025-08-05 Evidian Method for processing e.g. permission or roll demand, made by person of enterprise in workflow engine of information system to allow person to have access to color printer, involves sending response to engine via authorization system
US20170337501A1 (en) * 2025-08-05 2025-08-05 Unify Gmbh & Co. Kg System and method for coordinating and controlling production processes and inter-related decision making processes
US20130346134A1 (en) * 2025-08-05 2025-08-05 Siemens Enterprise Communications Gmbh & Co. Kg System and method for coordinating and controlling production processes and inter-related decision making process
US9679264B2 (en) * 2025-08-05 2025-08-05 Oracle International Corporation Role discovery using privilege cluster analysis
US20140129268A1 (en) * 2025-08-05 2025-08-05 Oracle International Corporation Role discovery using privilege cluster analysis
US20140164052A1 (en) * 2025-08-05 2025-08-05 Hartford Fire Insurance Company System and Method for Managing and Displaying Company Policy Data
US20150051957A1 (en) * 2025-08-05 2025-08-05 Oracle International Corporation Measuring customer experience value
US9760734B2 (en) * 2025-08-05 2025-08-05 Sap Se Catalog-based user authorization to access to multiple applications

Also Published As

Publication number Publication date
US8904391B2 (en) 2025-08-05

Similar Documents

Publication Publication Date Title
US8904391B2 (en) Policy-based access control approach to staff activities of a business process
Thakare et al. PARBAC: Priority-attribute-based RBAC model for azure IoT cloud
US8136146B2 (en) Secure audit log access for federation compliance
US8707383B2 (en) Computer workload management with security policy enforcement
US8732290B2 (en) Virtual workplace software based on organization characteristics
US9152401B2 (en) Methods and systems for generating and delivering an interactive application delivery store
US10679141B2 (en) Using classification data as training set for auto-classification of admin rights
US20110162034A1 (en) Discovery and management of context-based entitlements across loosely-coupled environments
US9077704B2 (en) Multiple authentication support in a shared environment
US8019845B2 (en) Service delivery using profile based management
US20080082761A1 (en) Generic locking service for business integration
EP1967993A1 (en) Dynamic workflow resource authentication and discovery
US20080306806A1 (en) Methods and apparatus for dynamically allocating tasks
US8522307B2 (en) Flexibly assigning security configurations to applications
US9600666B1 (en) Dynamic optimizing scanner for identity and access management (IAM) compliance verification
US20090063494A1 (en) Method and system to synchronize account names across a plurality of security systems
US20090006618A1 (en) Methods and systems for access routing and resource mapping using filters
US12132737B2 (en) Systems and methods for automated cloud provisioning
US8819231B2 (en) Domain based management of partitions and resource groups
CA2717505A1 (en) Method and apparatus for dynamic provisioning in data processing environment
US20230135054A1 (en) System and Methods for Agentless Managed Device Identification as Part of Setting a Security Policy for a Device
US20130311221A1 (en) Evaluating deployment readiness in delivery centers through collaborative requirements gathering
US20050071667A1 (en) Heterogenous domain-based routing mechanism for user authentication
US10243994B2 (en) Quantitatively measuring recertification campaign effectiveness
KR20060128598A (en) Method and system for membership determination through script

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BENANTAR, MESSAOUD B;MADDURI, HARI HARANATH;SIGNING DATES FROM 20070330 TO 20070419;REEL/FRAME:019195/0075

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BENANTAR, MESSAOUD B;MADDURI, HARI HARANATH;REEL/FRAME:019195/0075;SIGNING DATES FROM 20070330 TO 20070419

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.)

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20181202

台湾有什么特产最有名 soda是什么意思啊 十月二十七是什么星座 宫颈活检cin1级是什么意思 转奶是什么意思
左眼皮跳是什么预兆 小鸡吃什么食物 脂蛋白高是什么原因 pd999是什么金 神经性耳鸣吃什么药好
甲状腺五类是什么意思 梅开二度的意思是什么 腱鞘炎用什么药最好 什么玉最好有灵性养人 孕前检查挂什么科室
什么东西降火 做一半就软了是什么原因 为什么回族不吃猪肉 面粉和淀粉有什么区别 鲛人是什么意思
鹿晗什么时候回国的hcv8jop9ns2r.cn 安门是什么意思hcv8jop2ns6r.cn 什么补铁hcv8jop6ns8r.cn 炖猪排骨放什么调料hcv7jop4ns8r.cn 全麻后为什么不能睡觉hcv8jop7ns5r.cn
天珠是什么材质hcv9jop4ns5r.cn 儿童测骨龄挂什么科hcv9jop5ns1r.cn 南京立冬吃什么hcv9jop8ns3r.cn 公务员五行属什么hcv8jop4ns5r.cn 时髦是什么意思kuyehao.com
角头是什么意思hcv8jop1ns6r.cn 护士是干什么的hcv8jop2ns0r.cn 齿痕舌吃什么中成药hcv8jop1ns8r.cn 癌胚抗原是什么意思wuhaiwuya.com 欧皇什么意思hcv8jop8ns8r.cn
失眠是什么hcv7jop6ns4r.cn 外阴红肿疼痛用什么药wmyky.com 女性雄激素过高是什么原因引起的hcv8jop3ns1r.cn 疤痕修复用什么药膏好bysq.com 毛囊炎的症状是什么原因引起的hcv8jop9ns3r.cn
百度