An access control of enterprise financial privacy information based on RBAC model

被引:0
|
作者
Shi, Xuejiao [1 ]
机构
[1] Jiyuan Vocat & Tech Coll, Sch Econ Management, Jiyuan, Henan, Peoples R China
关键词
RBAC model; corporate finance; privacy information; access control; anomaly analysis;
D O I
10.1504/IJCAT.2024.143307
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
It is essential to improve the Role-Based Access Control (RBAC) method for controlling access to enterprise financial privacy information. First, this study proposes to solve the problem of information leakage and distortion in the acquisition of corporate financial privacy information. Then the statistical characteristics of private information resources are analysed by entropy analysis method. Secondly, the privacy information access anomaly analysis is completed. Finally, the RBAC model is built on this basis, and the multi-agent technology is introduced to ensure the user's privacy access. This approach aims to enhance the security and management effectiveness of enterprise financial privacy information and achieve access control to enterprise financial privacy information. Experimental results indicate that the proposed method can effectively reduce information leakage and distortion issues. However, it should be noted that due to legal and ethical considerations, it is necessary to adhere to data protection laws and regulations in implementing these access control measures.
引用
收藏
页码:372 / 381
页数:11
相关论文
共 50 条
  • [1] Modeling of RBAC-based access control of virtual enterprise
    Chen, Dejun
    Zhou, Zude
    Ma, Yingzhe
    Pham, D. T.
    KYBERNETES, 2008, 37 (9-10) : 1242 - 1249
  • [2] Platform for access control management in information system based on extended RBAC model
    Poniszewska-Maranda, Aneta
    12TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2010), 2011, : 510 - 517
  • [3] Team and task based RBAC access control model
    Zhou, Wei
    Meinel, Christoph
    2007 LATIN AMERICAN NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2007, : 84 - 94
  • [4] RBAC-based access control framework for ensuring privacy in ubiquitous computing
    Hong, Sung-Ho
    Cho, Eun-Ae
    Moon, Chang-Joo
    Baik, Doo-Kwon
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 278 - +
  • [5] Fine-grained Access Control Model Based on RBAC
    Gao, Lei
    Pan, Shulin
    AUTOMATION EQUIPMENT AND SYSTEMS, PTS 1-4, 2012, 468-471 : 1667 - +
  • [6] A Hierarchical Access Control Model of Software Repository Based on RBAC
    Cen Pengrui
    Wu LingDa
    Yang Chao
    Yu Ronghuan
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 761 - 765
  • [7] Privacy promises, access control, and privacy management - Enforcing privacy throughout an enterprise by extending access control
    Powers, CS
    Ashley, P
    Schunter, M
    THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE, PROCEEDINGS, 2002, : 13 - 21
  • [8] ELECTRONIC ACCESS TO ACCOUNT INFORMATION AND FINANCIAL PRIVACY
    DOHENY, DA
    FORRER, GJ
    BANKING LAW JOURNAL, 1992, 109 (05): : 436 - 455
  • [9] Improvement and implementation of RBAC access control model
    Information College, Capital University of Economics and Business, Beijing, China
    Proc. - Int. Conf. Manage. e-Commer. e-Govern., ICMeCG, 1600, (110-115):
  • [10] Improved Access Control Strategy Based on RBAC Model and Its Application
    Cheng, Yin-lei
    Wang, Fang
    Shang, Lei-ming
    Wang, Biao-ren
    Xu, Juan
    PROCEEDINGS OF THE 2015 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND AUTOMATION ENGINEERING, 2016, 42 : 808 - 813