An application using role-based access control model

被引:0
|
作者
Wang, G [1 ]
Cong, B [1 ]
Chen, N [1 ]
Lan, M [1 ]
Yan, HT [1 ]
机构
[1] Calif State Univ Fullerton, Fullerton, CA 92634 USA
关键词
distributed banking system; system security; user access; Role-Based Access Model;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The task of managing users' accesses to a system can be difficult, error-prone, and costly to a security administrator. Most of the time, this task is accomplished by directly associating users with permissions. In the banking industry, three software programs, EXIMBILL, FEDLINE and SWIFT, are used for the daily operation transactions such as letter of credit, loan payment, accounting, and money transfer. Even though each one deals security issue in different way, they all have same problem that permissions are directly related to users. In this paper; we consider to solve this common problem by implementing a new model based on the recently proposed Role-Based Access Model.
引用
收藏
页码:369 / 375
页数:7
相关论文
共 50 条
  • [1] Role-based access control model for GIS
    Pan, Yuqing
    Sheng, Yehua
    Zhou, Jieyu
    [J]. GEOINFORMATICS 2007: GEOSPATIAL INFORMATION TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6754
  • [2] A Role-Based Workflow Access Control Model
    Zhang Wen-dong
    Zhang Kai-ji
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 1136 - 1139
  • [3] Application Research of the CAN on Role-based Access Control
    Qin, Shi-Hong
    Zhao, Qing
    Ge, Zhou
    Li, Huanhuan
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4668 - +
  • [4] A formal model for Role-Based Access Control using graph transformation
    Koch, M
    Mancini, LV
    Parisi-Presicce, F
    [J]. COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 122 - 139
  • [5] An Administrative Model for Role-Based Access Control Using Hierarchical Namespace
    Xia, Luning
    Jing, Jiwu
    [J]. PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS 2006, SECTIONS 1-8, 2006, : 181 - 188
  • [6] APPLICATION OF ROLE-BASED ACCESS CONTROL IN INFORMATION SYSTEM
    Zhu, Rui-Feng
    Ning, Jie
    Yu, Pei
    [J]. 2012 INTERNATIONAL CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (LCWAMTIP), 2012, : 426 - 428
  • [7] Application of Role-Based Access Control for Web Environment
    Robles, Rosslin John
    Choi, Min-Kyu
    Yeo, Sang-Soo
    Kim, Tai-hoon
    [J]. INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 171 - +
  • [8] Distributed Role-based Access Control for Coaliagion Application
    HONG Fan ZHU Xian XING GuanglinHONG Fan
    [J]. Geo-spatial Information Science, 2005, (02) : 138 - 143
  • [9] Research and Application of an Extended Role-Based Access Control
    Zhao, Jingsheng
    Zhang, Wei
    Zhang, Peng
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2654 - 2656
  • [10] Distributed Role-based Access Control for Coaliagion Application
    Hong Fan
    Zhu Xian
    Xing Guanglin
    [J]. GEO-SPATIAL INFORMATION SCIENCE, 2005, 8 (02) : 138 - 143