Improved Access Control Strategy Based on RBAC Model and Its Application

被引:0
|
作者
Cheng, Yin-lei [1 ,2 ]
Wang, Fang [2 ]
Shang, Lei-ming [2 ]
Wang, Biao-ren [2 ]
Xu, Juan [2 ]
机构
[1] Hefei Univ Technol, Sch Comp & Informat, Hefei 230009, Anhui, Peoples R China
[2] Chinese Acad Sci, Inst Nucl Energy Safety Technol, Key Lab Neutron & Radiat Safety, Hefei 230031, Anhui, Peoples R China
关键词
access control; MUG-RBAC; CROSSFilter; security framework;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
System security is a significant factor which focuses on ensuring the reliability and security of system resource. In this paper, a MUG-RBAC (Multistage User Group RBAC) model is proposed based on improved role based access control strategy. The new model increased the entity of multistage user group in the RBAC and fine-grained allocation permissions. The validation of this model is realized in the application to the system security module. CROSSFilter is a part of the informatization platform of collaborative research and management which is developed by INEST CAS for constructing innovative and efficient research environment. By using this model, it shows that the usability of the security module CROSSFilter is enhanced compared with traditional Java security framework Spring Security to guarantee system stability, security and efficiency.
引用
收藏
页码:808 / 813
页数:6
相关论文
共 50 条
  • [1] Research on Improved RBAC Model and its Access Control Strategy
    Shi, Lei
    Sun, Shouqian
    Yuan, Jun
    [J]. 9TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED INDUSTRIAL DESIGN & CONCEPTUAL DESIGN, VOLS 1 AND 2: MULTICULTURAL CREATION AND DESIGN - CAID& CD 2008, 2008, : 1067 - +
  • [2] An improved RBAC model and its application
    Zhang, Zi
    Huang, Ting-lei
    [J]. THIRD INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING, 2009, : 735 - 737
  • [3] Research and application of access control model OF_RBAC
    Yang, Cai-xia
    Wang, Xiao-hui
    Cao, Min
    [J]. 2010 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING (MSE 2010), VOL 4, 2010, : 65 - 69
  • [4] Team and task based RBAC access control model
    Zhou, Wei
    Meinel, Christoph
    [J]. 2007 LATIN AMERICAN NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2007, : 84 - 94
  • [5] Fine-grained Access Control Model Based on RBAC
    Gao, Lei
    Pan, Shulin
    [J]. AUTOMATION EQUIPMENT AND SYSTEMS, PTS 1-4, 2012, 468-471 : 1667 - +
  • [6] A Hierarchical Access Control Model of Software Repository Based on RBAC
    Cen Pengrui
    Wu LingDa
    Yang Chao
    Yu Ronghuan
    [J]. PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 761 - 765
  • [7] Research and Application of Improved RBAC Model
    Pang Chun-jiang
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL III, 2008, : 257 - 260
  • [8] A Novel Role-Based-Access-Control(RBAC) Framework and Application
    Zhou, Yanjie
    Wen, Min
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND COMPUTING TECHNOLOGY, 2015, 30 : 207 - 210
  • [9] A RBAC-Based Multitask Spatio-Temporal Access Control Model MT_RBAC
    Ying, Zhang
    Zhen, Xu
    Chi, Chen
    [J]. PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON COMPUTING AND PATTERN RECOGNITION (ICCPR 2018), 2018, : 14 - 20
  • [10] I-RBAC: An identity& role based access control model
    Wang, Jin
    Li, Qiang
    Li, Daxing
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON CONTROL AND AUTOMATION, VOLS 1-7, 2007, : 1176 - +