APPLICATION OF ROLE-BASED ACCESS CONTROL IN INFORMATION SYSTEM

被引:0
|
作者
Zhu, Rui-Feng [1 ]
Ning, Jie [1 ]
Yu, Pei [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Res Inst Elect Sci & Technol, Chengdu 611731, Peoples R China
关键词
Access Control; RBAC; Role;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In a practical system of commerce sites, we not only need to focus on their own functional requirements, but also need to consider many other security requirements. Security is a very important aspect. Access control occupies a vital role in a website system. To solve the problem of access control is to solve a majority of the security problem. The role-based access control model separated users and permission with logically, meanwhile it reduces the complexity of management, and reduces administrative overhead and management complexity. The role-based access control model will play an important role in the increasing size of business information management system. We can use the role-based access control model to solve the problem of access control, and put it into the information system.
引用
收藏
页码:426 / 428
页数:3
相关论文
共 50 条
  • [31] Role-Based Access Control techniques for open medical information systems
    Hayden, MB
    Prichard, JJ
    [J]. DECISION SCIENCES INSTITUTE 1998 PROCEEDINGS, VOLS 1-3, 1998, : 964 - 966
  • [32] A legal information flow (LIF) scheduler based on role-based access control model
    Enokido, Tomoya
    Barolli, Valbona
    Takizawa, Makoto
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) : 906 - 912
  • [33] An attributable role-based access control for healthcare
    Schwartmann, D
    [J]. COMPUTATIONAL SCIENCE - ICCS 2004, PROCEEDINGS, 2004, 3039 : 1148 - 1155
  • [34] An experimental news production system with flexible role-based access control
    Ho, MC
    Li, TY
    [J]. ITRE 2005: 3rd International Conference on Information Technology: Research and Education, Proceedings, 2005, : 287 - 291
  • [35] Homonymous role in role-based discretionary access control
    Chu, Xiaowen
    Kai Ouyang
    Chen, Hsiao-Hwa
    Liu, Jiangchuan
    Jiang, Yixin
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2009, 9 (09): : 1287 - 1300
  • [36] On the homonymous role in role-based discretionary access control
    Ouyang, Kai
    Chu, Xiaowen
    Jiang, Yixin
    Chen, Hsiao-Hwa
    Liu, Jiangchuan
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 313 - +
  • [37] Security Analysis of Administrative Role-Based Access Control Policies with Contextual Information
    Khai Kim Quoc Dinh
    Tuan Duc Tran
    Anh Truong
    [J]. FUTURE DATA AND SECURITY ENGINEERING, 2017, 10646 : 243 - 261
  • [38] Extending a Role Graph for Role-Based Access Control
    Asakura, Yoshiharu
    Nakamoto, Yukikazu
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (02): : 211 - 219
  • [39] Role-based access control for boxed ambients
    Compagnoni, Adriana
    Gunter, Elsa L.
    Bidinger, Philippe
    [J]. THEORETICAL COMPUTER SCIENCE, 2008, 398 (1-3) : 203 - 216
  • [40] Rights management for role-based access control
    Bouwman, Bart
    Mauw, Sjouke
    Petkovic, Milan
    [J]. 2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 1085 - +