The RBAC based privilege management for authorization of wireless networks

被引:0
|
作者
Park, DG [1 ]
Lee, YR [1 ]
机构
[1] Soonchunhyang Univ, Coll Engn, Dept Informat & Technol Engn, Asan, Choongnam, South Korea
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
M-commerce have grown rapidly, it is very important to determine whether an identity is permitted to access a resource in mobile environments. In this paper we propose RBAC based Wireless Privilege Management Infrastructure(WPMI) model and Wireless Attribute Certificate(WAC) for authorization in mobile communication. All access control decisions are driven by an authorization policy, which is itself stored in an WAC. Authorization policies are written in XML according to a DTD that has been published at XML.org. Finally we show the effectiveness of the proposed RBAC by applying it to an example of M-commerce service.
引用
收藏
页码:314 / 326
页数:13
相关论文
共 50 条
  • [1] The ET-RBAC based Privilege Management Infrastructure for wireless networks
    Park, DG
    Lee, YR
    E-COMMERCE AND WEB TECHNOLOGIES, PROCEEDINGS, 2003, 2738 : 84 - 93
  • [2] Design and Implementation of Privilege Management System Based on RBAC
    Lu Pengyu
    Song Hui
    He Liangjun
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5078 - 5081
  • [3] Enterprise privilege management based on T-RBAC
    Jin, Qiongcheng
    Yang, Shutang
    Jiang, Xinghao
    Li, Jianhua
    Jisuanji Gongcheng/Computer Engineering, 2004, 30 (19):
  • [4] THE DESIGN OF THE SECURE TRANSMISSION AND AUTHORIZATION MANAGEMENT SYSTEM BASED ON RBAC
    Lu, Guoqing
    Zhao, Lingling
    Yang, Kuihe
    PROCEEDINGS OF 2014 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOL 1, 2014, : 103 - 108
  • [5] RBAC policies in XML for X.509 based privilege management
    Chadwick, DW
    Otenko, A
    SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 39 - 53
  • [6] Implementation of the Authorization Management with RBAC in the Usage Control Model
    Cai, Hui
    Li, Peiwu
    PROCEEDINGS OF INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2009), 2009, : 179 - 182
  • [7] Design and Implementation of Authorization System Based on RBAC
    Li, Furong
    Wu, Haitao
    2015 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS IHMSC 2015, VOL I, 2015, : 502 - 504
  • [8] Web-based authorization based on X.509 Privilege Management Infrastructure
    Forné, J
    Hinarejos, MF
    2003 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS, AND SIGNAL PROCESSING, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2003, : 565 - 568
  • [9] A Family of RBAC-Based Workflow Authorization Models
    HONG Fan
    WuhanUniversityJournalofNaturalSciences, 2005, (01) : 324 - 328
  • [10] An OWL-based approach for RBAC with negative authorization
    Heilili, Nuermaimaiti
    Chen, Yang
    Zhao, Chen
    Luo, Zhenxing
    Lin, Zuoquan
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, 2006, 4092 : 164 - 175