Access control based on RBAC in distributed cooperation environment

被引:0
|
作者
Yin Shao-hong [1 ]
Wang Wei [2 ]
机构
[1] Tianjin Polytech Univ, Sch Comp Tech & Automizat, Tianjin, Peoples R China
[2] Tianjin Polytech Univ, Sch Informat & Commun Engn, Tianjin, Peoples R China
关键词
D O I
10.1109/ISDPE.2007.14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The distributed cooperation environment is applied more and more in many departments and enterprises. But the traditional RBAC96 model can't resolve the access control problems in the distributed cooperation environment. Based on the traditional RBAC96 model, this paper proposes the dRBAC model which adds delegation mechanism contrast to the RBAC96 model. This model can efficiently resolve the access control problem in the distributed cooperation environment.
引用
收藏
页码:119 / +
页数:2
相关论文
共 50 条
  • [31] Method of Information System Authority Control Based on RBAC in Web Environment
    Zhang, Yongping
    Wu, Mingming
    Wan, Zhuqing
    [J]. 2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 2, 2010, : 542 - 545
  • [32] Owner-Based Role-Based Access Control OB-RBAC
    Saffarian, Mohsen
    Sadighi, Babak
    [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 236 - 241
  • [33] A collaborative role-based access control for trusted operating systems in distributed environment
    Kim, HC
    Ramakrishna, RS
    Sakurai, K
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (01) : 270 - 279
  • [34] Trust Level Based Data Storage and Data Access Control in a Distributed Storage Environment
    Roos, Andreas
    Druesedow, Steffen
    Hosseini, Mahya Ilaghi
    Coskun, Goekhan
    Zickau, Sebastian
    [J]. 2015 3RD IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2015), 2015, : 169 - 176
  • [35] Management advantages of object classification in role-based access control (RBAC)
    Jafari, Mohammad
    Fathian, Mohammad
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 95 - 110
  • [36] Mining Attribute-Based Access Control Policies from RBAC Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    [J]. 2013 10TH INTERNATIONAL CONFERENCE AND EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2013,
  • [37] I-RBAC: An identity& role based access control model
    Wang, Jin
    Li, Qiang
    Li, Daxing
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON CONTROL AND AUTOMATION, VOLS 1-7, 2007, : 1176 - +
  • [38] Platform for access control management in information system based on extended RBAC model
    Poniszewska-Maranda, Aneta
    [J]. 12TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2010), 2011, : 510 - 517
  • [39] uT-RBAC: Ubiquitous role-based access control model
    Chae, SH
    Kim, W
    Kim, DK
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01): : 238 - 239
  • [40] Based on Expand RBAC Grid Collaborative Design System Access Control Model
    Chen, Xuebin
    Duan, Guolin
    Cai, Jin
    [J]. ICHIT 2008: INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 217 - 221