Research on object-oriented role-based access control model

被引:3
|
作者
Luo, JY [1 ]
He, DK [1 ]
机构
[1] SW Jiaotong Univ, Sch Comp & Commun Engn, Chengdu 610031, Peoples R China
关键词
role; privilege; static authorization; dynamic authorization; object;
D O I
10.1109/PDCAT.2003.1236273
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we provide an object-oriented model for Role-Based Access Control (RBAC). In RBAC, permissions are associated with roles. Users are assigned members of roles, thereby obtaining the associated permissions. Administrators dominate the authorization of access permissions to make target resource available for users. We introduce the concept of object to provide an efficient access control mechanism for multi-domains distributed system, with centralized control and decentralized management of the policy controller. This model discusses static and dynamic role authorization, and further analysis of dynamic features of the model.
引用
收藏
页码:132 / 135
页数:4
相关论文
共 50 条
  • [1] Role-Based Access Control Model as Applied to Object-Oriented Applications
    Oleynik, Pavel P.
    [J]. 2016 DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES (DYNAMICS), 2016,
  • [2] Embedding role-based access control model in object-oriented systems to protect privacy
    Chou, SC
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 71 (1-2) : 143 - 161
  • [3] An object-oriented organizational model to support dynamic role-based access control in electronic commerce
    Cheng, EC
    [J]. DECISION SUPPORT SYSTEMS, 2000, 29 (04) : 357 - 369
  • [4] Integrating object oriented role-based access control model with mandatory access control principles
    Zhang, CN
    Yang, CG
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2003, 43 (03) : 40 - 49
  • [5] Role-based exploration of object-oriented programs
    Demsky, B
    Rinard, M
    [J]. ICSE 2002: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 2002, : 313 - 324
  • [6] Extensible and reusable role-based object-oriented security
    Demurjian, SA
    Ting, TC
    Price, M
    Hu, MY
    [J]. DATABASE SECURITY VOLUME X - STATUS AND PROSPECTS, 1997, : 288 - 307
  • [7] Access control model in object-oriented systems
    Izaki, K
    Tanaka, K
    Takizawa, M
    [J]. SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS: WORKSHOPS, PROCEEDINGS, 2000, : 69 - 74
  • [8] Applications of the oriented permission role-based access control model
    Chen, Liang
    Crampton, Jason
    [J]. 2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2007, : 387 - +
  • [9] The Research for Spatial Role-Based Access Control Model
    Zou, Zhiwen
    Chen, Changqian
    Ju, Shiguang
    Chen, Jiming
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 4, PROCEEDINGS, 2010, 6019 : 296 - 308
  • [10] Object-Specific Role-Based Access Control
    Mundbrod, Nicolas
    Reichert, Manfred
    [J]. INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS, 2019, 28 (01)