APPLICATION OF ROLE-BASED ACCESS CONTROL IN INFORMATION SYSTEM

被引:0
|
作者
Zhu, Rui-Feng [1 ]
Ning, Jie [1 ]
Yu, Pei [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Res Inst Elect Sci & Technol, Chengdu 611731, Peoples R China
关键词
Access Control; RBAC; Role;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In a practical system of commerce sites, we not only need to focus on their own functional requirements, but also need to consider many other security requirements. Security is a very important aspect. Access control occupies a vital role in a website system. To solve the problem of access control is to solve a majority of the security problem. The role-based access control model separated users and permission with logically, meanwhile it reduces the complexity of management, and reduces administrative overhead and management complexity. The role-based access control model will play an important role in the increasing size of business information management system. We can use the role-based access control model to solve the problem of access control, and put it into the information system.
引用
收藏
页码:426 / 428
页数:3
相关论文
共 50 条
  • [21] Information flow control among objects in role-based access control model
    Izaki, K
    Tanaka, K
    Takizawa, M
    [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, 2001, 2113 : 299 - 308
  • [22] A Survey of Role Mining Methods in Role-Based Access Control System
    Fang, Liang
    Guo, Yunchuan
    [J]. WEB TECHNOLOGIES AND APPLICATIONS, APWEB 2014, PT II, 2014, 8710 : 291 - 300
  • [23] Role-based access control in DCOM
    Ahn, GJ
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [24] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    [J]. COMPUTER, 2012, 45 (06) : 81 - 88
  • [25] Role-based access control hierarchy model in distributed system
    Hong, Fan
    Wu, Min
    [J]. 2003, Huazhong University of Science and Technology (31):
  • [26] Grid Learning Management System with Role-Based Access Control
    Somasundaram, Thamarai Selvi
    Manimalar, PriyaaDharshini
    Kannan, G.
    Kumar, Vive
    Sidhan, Mohan
    [J]. FIRST INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING 2009 (ICAC 2009), 2009, : 167 - +
  • [27] Role delegation in role-based access control
    Na, SangYeob
    Cheon, SuhHyun
    [J]. Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 39 - 44
  • [28] Practical Role-Based Access Control
    Galante, Victoria
    [J]. INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73
  • [29] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    [J]. International Journal of Information Security, 2008, 7 : 123 - 136
  • [30] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (02) : 123 - 136