Access control based on RBAC in distributed cooperation environment

被引:0
|
作者
Yin Shao-hong [1 ]
Wang Wei [2 ]
机构
[1] Tianjin Polytech Univ, Sch Comp Tech & Automizat, Tianjin, Peoples R China
[2] Tianjin Polytech Univ, Sch Informat & Commun Engn, Tianjin, Peoples R China
关键词
D O I
10.1109/ISDPE.2007.14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The distributed cooperation environment is applied more and more in many departments and enterprises. But the traditional RBAC96 model can't resolve the access control problems in the distributed cooperation environment. Based on the traditional RBAC96 model, this paper proposes the dRBAC model which adds delegation mechanism contrast to the RBAC96 model. This model can efficiently resolve the access control problem in the distributed cooperation environment.
引用
收藏
页码:119 / +
页数:2
相关论文
共 50 条
  • [1] Distributed access control method based on RBAC in OSGi service platform
    Cho, Eun-Ae
    Moon, Chang-Joo
    Baik, Doo-Kwon
    [J]. DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2007, 14 : 1427 - 1431
  • [2] Efficient Access Enforcement in Distributed Role-Based Access Control (RBAC) Deployments
    Tripunitara, Mahesh V.
    Carbunar, Bogdan
    [J]. SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 155 - 164
  • [3] An XML-based language for access control specifications in an RBAC environment
    Stoupa, KE
    Vakali, AI
    [J]. 2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 1717 - 1722
  • [4] Context RBAC/MAC access control for ubiquitous environment
    Kim, Kyu Il
    Ko, Hyuk Jin
    Hwang, Hyun Sik
    Kim, Ung Mo
    [J]. ADVANCES IN DATABASES: CONCEPTS, SYSTEMS AND APPLICATIONS, 2007, 4443 : 1075 - +
  • [5] AC-based RBAC model in the distributed environment
    College of Computer Sci. and Technol., Huazhong Univ. of Sci. and Technol., Wuhan 430074, China
    [J]. Huazhong Ligong Daxue Xuebao, 2006, 2 (64-66):
  • [6] Ontology-based RBAC specification for interoperation in distributed environment
    Wu, Di
    Chen, Xiyuan
    Lin, Jian
    Zhu, Miaoliang
    [J]. SEMANTIC WEB - ASWC 2006, PROCEEDINGS, 2006, 4185 : 179 - 190
  • [7] Security violation detection for RBAC based interoperation in distributed environment
    Wang, Xinyu
    Sun, Jianling
    Yang, Xiaohu
    Huang, Chao
    Wu, Di
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05) : 1447 - 1456
  • [8] Behavior-based access control for distributed healthcare environment
    Yarmand, Mohammad H.
    Sartidi, Kamran
    Down, Doughlas G.
    [J]. PROCEEDINGS OF THE 21ST IEEE INTERNATIONAL SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS, 2008, : 126 - 131
  • [9] λ-RBAC: PROGRAMMING WITH ROLE-BASED ACCESS CONTROL
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    [J]. LOGICAL METHODS IN COMPUTER SCIENCE, 2008, 4 (01)
  • [10] λ-RBAC:: Programming with role-based access control
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 456 - 467