Role-based access control model for CSCW systems

被引:0
|
作者
Li, Chengkai [1 ]
Zhan, Yongzhao [1 ]
Mao, Bing [1 ]
Xie, Li [1 ]
机构
[1] Nanjing Univ, Nanjing, China
来源
Ruan Jian Xue Bao/Journal of Software | 2000年 / 11卷 / 07期
关键词
Groupware - Security of data;
D O I
暂无
中图分类号
学科分类号
摘要
CSCW systems introduce new requirements for access control, which cannot be met by using existing models. A new role-based access control model, RBCSAC (role-based collaborative systems access control), is introduced to meet these requirements. This model formally describes the relationship among the key elements of access control such as data, operation, privilege, role and user. It provides the method for recording access control information. The model grants and revokes access privileges of cooperative users by assigning them some roles and canceling their roles. Two role-assignment rules and two checking rules of operation legality are also provided. RBCSAC model is brought forward aiming at accommodating to the characteristics of collaborative systems such as multi-user, interaction, collaboration, real-time, dynamic.
引用
收藏
页码:931 / 937
相关论文
共 50 条
  • [21] A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach
    Figueroa-Lorenzo, Santiago
    Anorga, Javier
    Arrizabalaga, Saioa
    SENSORS, 2019, 19 (20)
  • [22] Conformance Testing of Temporal Role-Based Access Control Systems
    Masood, Ammar
    Ghafoor, Arif
    Mathur, Aditya
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2010, 7 (02) : 144 - 158
  • [23] On Automated Role-Based Access Control Assessment in Enterprise Systems
    Walker, Andrew
    Svacina, Jan
    Simmons, Johnathan
    Cerny, Tomas
    INFORMATION SCIENCE AND APPLICATIONS, 2020, 621 : 375 - 385
  • [24] The application of role-based access control in workflow management systems
    Liu, JX
    Sun, LX
    2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 5492 - 5496
  • [25] Role-based access control for CORBA distributed object systems
    Obelheiro, RR
    Fraga, JS
    PROCEEDINGS OF THE SEVENTH IEEE INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE SYSTEMS, 2002, : 53 - 60
  • [26] A framework for role-based access control in group communication systems
    Nita-Rotaru, C
    Li, N
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2004, : 522 - 529
  • [27] FORBAC: A flexible organisation and role-based access control model for secure information systems
    Saidani, Oumaima
    Nurcan, Selmin
    ADVANCES IN INFORMATION SYSTEMS, PROCEEDINGS, 2006, 4243 : 364 - 376
  • [28] Role hierarchy model for role-based access control and its application
    Zhong, Hua
    Feng, Yulin
    Jiang, Hongan
    2000, (11):
  • [29] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    COMPUTER, 2012, 45 (06) : 81 - 88
  • [30] Role-based access control in DCOM
    Ahn, GJ
    JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184