Role-based access control model for CSCW systems

被引:0
|
作者
Li, Chengkai [1 ]
Zhan, Yongzhao [1 ]
Mao, Bing [1 ]
Xie, Li [1 ]
机构
[1] Nanjing Univ, Nanjing, China
来源
Ruan Jian Xue Bao/Journal of Software | 2000年 / 11卷 / 07期
关键词
Groupware - Security of data;
D O I
暂无
中图分类号
学科分类号
摘要
CSCW systems introduce new requirements for access control, which cannot be met by using existing models. A new role-based access control model, RBCSAC (role-based collaborative systems access control), is introduced to meet these requirements. This model formally describes the relationship among the key elements of access control such as data, operation, privilege, role and user. It provides the method for recording access control information. The model grants and revokes access privileges of cooperative users by assigning them some roles and canceling their roles. Two role-assignment rules and two checking rules of operation legality are also provided. RBCSAC model is brought forward aiming at accommodating to the characteristics of collaborative systems such as multi-user, interaction, collaboration, real-time, dynamic.
引用
收藏
页码:931 / 937
相关论文
共 50 条
  • [1] An Extended Role-Based Access Control Model for CSCW Systems
    Chen, Bing
    MACHINING AND ADVANCED MANUFACTURING TECHNOLOGY X, 2010, 431-432 : 577 - 582
  • [2] Role-based access control model for GIS
    Pan, Yuqing
    Sheng, Yehua
    Zhou, Jieyu
    GEOINFORMATICS 2007: GEOSPATIAL INFORMATION TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6754
  • [3] A Role-Based Workflow Access Control Model
    Zhang Wen-dong
    Zhang Kai-ji
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 1136 - 1139
  • [4] On Formalizing and Normalizing Role-Based Access Control Systems
    Power, David
    Slaymaker, Mark
    Simpson, Andrew
    COMPUTER JOURNAL, 2009, 52 (03): : 305 - 325
  • [5] Policy storage for role-based access control systems
    Belokosztolszki, A
    Eyers, DM
    Wang, W
    Moody, K
    TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 196 - 201
  • [6] On formalizing and normalizing role-based access control systems
    Power, David
    Slaymaker, Mark
    Simpson, Andrew
    Computer Journal, 2009, 52 (03): : 305 - 325
  • [7] Role-based access control
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [8] A role-based access control model for information mediation
    Yang, L
    Ege, RK
    Ezenwoye, O
    Kharma, Q
    PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 277 - 282
  • [9] Attributes Enhanced Role-Based Access Control Model
    Rajpoot, Qasim Mahmood
    Jensen, Christian Damsgaard
    Krishnan, Ram
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 3 - 17
  • [10] The Research for Spatial Role-Based Access Control Model
    Zou, Zhiwen
    Chen, Changqian
    Ju, Shiguang
    Chen, Jiming
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 4, PROCEEDINGS, 2010, 6019 : 296 - 308