Role-based access control model for CSCW systems

被引:0
|
作者
Li, Chengkai [1 ]
Zhan, Yongzhao [1 ]
Mao, Bing [1 ]
Xie, Li [1 ]
机构
[1] Nanjing Univ, Nanjing, China
来源
Ruan Jian Xue Bao/Journal of Software | 2000年 / 11卷 / 07期
关键词
Groupware - Security of data;
D O I
暂无
中图分类号
学科分类号
摘要
CSCW systems introduce new requirements for access control, which cannot be met by using existing models. A new role-based access control model, RBCSAC (role-based collaborative systems access control), is introduced to meet these requirements. This model formally describes the relationship among the key elements of access control such as data, operation, privilege, role and user. It provides the method for recording access control information. The model grants and revokes access privileges of cooperative users by assigning them some roles and canceling their roles. Two role-assignment rules and two checking rules of operation legality are also provided. RBCSAC model is brought forward aiming at accommodating to the characteristics of collaborative systems such as multi-user, interaction, collaboration, real-time, dynamic.
引用
收藏
页码:931 / 937
相关论文
共 50 条
  • [41] Study of Role-based Access Control
    Cao Yonghui
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5209 - 5212
  • [42] A generalized temporal and spatial role-based access control model
    Chen H.-C.
    Wang S.-J.
    Wen J.-H.
    Huang Y.-F.
    Chen C.-W.
    Journal of Networks, 2010, 5 (08) : 912 - 920
  • [43] Integrating Role-Based Access Control Model with Web Server
    Li, Celia
    Yang, Cungang
    Qin, Ling
    Yang, Yiguang
    2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009), 2009, : 615 - 618
  • [44] Role-based Access Control Model in Home Network Environments
    Kim, Do-Woo
    Kim, Geon Woo
    Lee, Jun-Ho
    Han, Jong-Wook
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 8, 2005, 8 : 97 - 99
  • [45] A Novel Role-based Access Control Model in Cloud Environments
    Jun Luo
    Hongjun Wang
    Xun Gong
    Tianrui Li
    International Journal of Computational Intelligence Systems, 2016, 9 : 1 - 9
  • [46] Enterprise model as a basis of administration on role-based access control
    Oh, S
    Park, S
    PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON COOPERATIVE DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, 2000, : 150 - 158
  • [47] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
  • [48] AMTRAC: An administrative model for temporal role-based access control
    Sharma, Manisha
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    COMPUTERS & SECURITY, 2013, 39 : 201 - 218
  • [49] A privacy enhanced role-based access control model for enterprises
    Yang, CG
    Zhang, CN
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1012 - 1021
  • [50] A Purpose-Involved Role-Based Access Control Model
    Wang, Yingjie
    Zhou, Zhihong
    Li, Jianhua
    FOUNDATIONS OF INTELLIGENT SYSTEMS (ISKE 2013), 2014, 277 : 1119 - 1131