APPLICATION OF ROLE-BASED ACCESS CONTROL IN INFORMATION SYSTEM

被引:0
|
作者
Zhu, Rui-Feng [1 ]
Ning, Jie [1 ]
Yu, Pei [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Res Inst Elect Sci & Technol, Chengdu 611731, Peoples R China
关键词
Access Control; RBAC; Role;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In a practical system of commerce sites, we not only need to focus on their own functional requirements, but also need to consider many other security requirements. Security is a very important aspect. Access control occupies a vital role in a website system. To solve the problem of access control is to solve a majority of the security problem. The role-based access control model separated users and permission with logically, meanwhile it reduces the complexity of management, and reduces administrative overhead and management complexity. The role-based access control model will play an important role in the increasing size of business information management system. We can use the role-based access control model to solve the problem of access control, and put it into the information system.
引用
收藏
页码:426 / 428
页数:3
相关论文
共 50 条
  • [1] A role-based access control model for information mediation
    Yang, L
    Ege, RK
    Ezenwoye, O
    Kharma, Q
    [J]. PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 277 - 282
  • [2] Application Research of the CAN on Role-based Access Control
    Qin, Shi-Hong
    Zhao, Qing
    Ge, Zhou
    Li, Huanhuan
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4668 - +
  • [3] An application using role-based access control model
    Wang, G
    Cong, B
    Chen, N
    Lan, M
    Yan, HT
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, 2000, : 369 - 375
  • [4] Application of Role-Based Access Control for Web Environment
    Robles, Rosslin John
    Choi, Min-Kyu
    Yeo, Sang-Soo
    Kim, Tai-hoon
    [J]. INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 171 - +
  • [5] Distributed Role-based Access Control for Coaliagion Application
    HONG Fan ZHU Xian XING GuanglinHONG Fan
    [J]. Geo-spatial Information Science, 2005, (02) : 138 - 143
  • [6] Research and Application of an Extended Role-Based Access Control
    Zhao, Jingsheng
    Zhang, Wei
    Zhang, Peng
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2654 - 2656
  • [7] Distributed Role-based Access Control for Coaliagion Application
    Hong Fan
    Zhu Xian
    Xing Guanglin
    [J]. GEO-SPATIAL INFORMATION SCIENCE, 2005, 8 (02) : 138 - 143
  • [8] The application research of role-based access control model in workflow management system
    Wang, BY
    Zhang, SM
    Xia, XD
    [J]. GRID AND COOPERATIVE COMPUTING, PT 2, 2004, 3033 : 1034 - 1037
  • [9] A Role-Based Access Control System for Intelligent Buildings
    Xue, Nian
    Jiang, Chenglong
    Huang, Xin
    Liu, Dawei
    [J]. NETWORK AND SYSTEM SECURITY, 2017, 10394 : 710 - 720
  • [10] Role-based access control system for web services
    Feng, X
    Guoyuan, L
    Hao, H
    Li, X
    [J]. FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2004, : 357 - 362