APPLICATION OF ROLE-BASED ACCESS CONTROL IN INFORMATION SYSTEM

被引:0
|
作者
Zhu, Rui-Feng [1 ]
Ning, Jie [1 ]
Yu, Pei [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Res Inst Elect Sci & Technol, Chengdu 611731, Peoples R China
关键词
Access Control; RBAC; Role;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In a practical system of commerce sites, we not only need to focus on their own functional requirements, but also need to consider many other security requirements. Security is a very important aspect. Access control occupies a vital role in a website system. To solve the problem of access control is to solve a majority of the security problem. The role-based access control model separated users and permission with logically, meanwhile it reduces the complexity of management, and reduces administrative overhead and management complexity. The role-based access control model will play an important role in the increasing size of business information management system. We can use the role-based access control model to solve the problem of access control, and put it into the information system.
引用
收藏
页码:426 / 428
页数:3
相关论文
共 50 条
  • [41] Role-based access control in TOBIAS and NESS
    Marshall, LF
    [J]. IEE PROCEEDINGS-SOFTWARE, 2006, 153 (01): : 4 - 6
  • [42] The research on role-based access control mechanism for workflow management system
    Wang, BY
    Zhang, SM
    [J]. GRID AND COOPERATIVE COMPUTING GCC 2004, PROCEEDINGS, 2004, 3251 : 729 - 736
  • [43] A Role-Based Access Control System Using Attribute-Based Encryption
    Wang, Yong
    Ma, Yuan
    Xiang, Keyu
    Liu, Zhenyan
    Li, Ming
    [J]. 2018 INTERNATIONAL CONFERENCE ON BIG DATA AND ARTIFICIAL INTELLIGENCE (BDAI 2018), 2018, : 128 - 133
  • [44] Role-Based Access Control in Multi-Satellite Planning System
    Zhu, Jiajia
    Li, Ziyang
    Liu, Zhe
    Wu, Hao
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATION AND EDUCATION TECHNOLOGY (ICCAET 2011), 2011, : 362 - 364
  • [45] Elements of a language for role-based access control
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 371 - 380
  • [46] Cryptographic Enforcement of Role-Based Access Control
    Crampton, Jason
    [J]. FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 191 - 205
  • [47] Role-based access control model for GIS
    Pan, Yuqing
    Sheng, Yehua
    Zhou, Jieyu
    [J]. GEOINFORMATICS 2007: GEOSPATIAL INFORMATION TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6754
  • [48] Garbled role-based access control in the cloud
    Masoom Alam
    Naina Emmanuel
    Tanveer Khan
    Yang Xiang
    Houcine Hassan
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1153 - 1166
  • [49] Resource hierarchies for role-based access control
    Wolf, A
    Von Hammel-Bonten, C
    Köhlmann, M
    Würfel, U
    [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VI, PROCEEDINGS: INDUSTRIAL SYSTEMS AND ENGINEERING I, 2002, : 195 - 200
  • [50] Hierarchical role-based access control development
    Kolegov, D. N.
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2012, 17 (03): : 70 - 76