RBAC-Based Access Control Integration Framework for Legacy System

被引:0
|
作者
Guo, He [1 ,2 ]
Lu, Guoji [1 ]
Wang, Yuxin [1 ]
Li, Han [1 ]
Chen, Xin [2 ]
机构
[1] Dalian Univ Technol, Sch Comp Sci & Technol, Dalian 116024, Peoples R China
[2] Dalian Univ Technol, Sch Software, Dalian 116024, Peoples R China
来源
关键词
legacy system; access control; system integration; Role-Based Access Control (RBAC); task tree;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access control comprises different kinds of access control policies. This paper proposed an RBAC-based access control integration framework to achieve and manage various access control policies during legacy system integration. Permission is defined as tasks, and tasks are extracted and organized as tree structure for each system. Then, a global task tree and an integrated policy library are generated for the integrated system to reorganize access control policies of different legacy systems. Additionally rules for authorization management are given to carry out further authorization. A case study is demonstrated to depict the proposed framework is a feasible and flexible solution for access control integration.
引用
收藏
页码:194 / +
页数:2
相关论文
共 50 条
  • [1] RBAC-based access control framework for ensuring privacy in ubiquitous computing
    Hong, Sung-Ho
    Cho, Eun-Ae
    Moon, Chang-Joo
    Baik, Doo-Kwon
    [J]. 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 278 - +
  • [2] Modeling of RBAC-based access control of virtual enterprise
    Chen, Dejun
    Zhou, Zude
    Ma, Yingzhe
    Pham, D. T.
    [J]. KYBERNETES, 2008, 37 (9-10) : 1242 - 1249
  • [3] A RBAC-Based Multitask Spatio-Temporal Access Control Model MT_RBAC
    Ying, Zhang
    Zhen, Xu
    Chi, Chen
    [J]. PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON COMPUTING AND PATTERN RECOGNITION (ICCPR 2018), 2018, : 14 - 20
  • [4] RBAC-Based UAV Control System for Multiple Operator Environments
    Jeong, Hyeok-June
    Ha, Young-Guk
    [J]. COMPUTER APPLICATIONS FOR SOFTWARE ENGINEERING, DISASTER RECOVERY, AND BUSINESS CONTINUITY, 2012, 340 : 210 - +
  • [5] The RBAC-based user authorization in Sanxin ERP system
    Liu, LL
    Shu, J
    Zheng, JX
    [J]. PROCEEDINGS OF THE 11TH JOINT INTERNATIONAL COMPUTER CONFERENCE, 2005, : 155 - 158
  • [6] An RBAC-based access control model for object-oriented systems offering dynamic aspect features
    Chou, SC
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2005, E88D (09) : 2143 - 2147
  • [7] An RBAC-based policy information base
    Squair, TE
    Jamhour, E
    Nabhen, RC
    [J]. SIXTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 171 - 180
  • [8] Controlling information access in workflow management systems using RBAC-based model
    Chou, Shih-Chien
    Wu, Chien-Jung
    [J]. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2007, 30 (02) : 331 - 336
  • [9] A Family of RBAC-Based Workflow Authorization Models
    HONG Fan
    [J]. Wuhan University Journal of Natural Sciences, 2005, (01) : 324 - 328
  • [10] On Role Mappings for RBAC-based Secure Interoperation
    Hu, Jinwei
    Li, Ruixuan
    Lu, Zhengding
    [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 270 - 277