An efficient role and object based access control model implemented in a PDM system

被引:0
|
作者
Huang Xiaowen [1 ]
Tan Jian [1 ]
Huang Xiangguo [1 ]
机构
[1] Wuhan Univ Technol, Sch Mechantron Engn, Wuhan 430070, Peoples R China
关键词
PDM; mandatory access control; discretionary access control; role based access control;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
An effective and reliable access control is crucial to a PDM system. This article has discussed the commonly used access control models, analyzed their advantages and disadvantages, and proposed a new Role and Object based access control model that suits the particular needs of a PDM system. The new model has been implemented in a commercial PDM system, which has demonstrated enhanced flexibility and convenience.
引用
收藏
页码:788 / 791
页数:4
相关论文
共 50 条
  • [21] Semantic Role Based Access Control Model
    Semenova, N. A.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2012, 16 (02): : 50 - 64
  • [22] An authorization model for object-oriented databases and its efficient access control
    Morita, T
    Ishihara, Y
    Seki, H
    Ito, M
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 1998, E81D (06): : 521 - 531
  • [23] Task-Role Based Access Control Model in Logistics Management System
    Yu, Yingying
    Chen, Yan
    Wen, Yuqin
    2013 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS (SOLI), 2013, : 130 - 135
  • [24] A role based access control model for agent based control systems
    Drouineaud, M
    Lüder, A
    Sohr, K
    INDIN 2003: IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, PROCEEDINGS, 2003, : 307 - 311
  • [25] Role-based access control for CORBA distributed object systems
    Obelheiro, RR
    Fraga, JS
    PROCEEDINGS OF THE SEVENTH IEEE INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE SYSTEMS, 2002, : 53 - 60
  • [26] Embedding role-based access control model in object-oriented systems to protect privacy
    Chou, SC
    JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 71 (1-2) : 143 - 161
  • [27] THE EVALUATION AND COMPARATIVE ANALYSIS OF ROLE BASED ACCESS CONTROL AND ATTRIBUTE BASED ACCESS CONTROL MODEL
    Aftab, Muhammad Umar
    Qin, Zhiguang
    Zakria
    Ali, Safeer
    Pirah
    Khan, Jalaluddin
    2018 15TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2018, : 35 - 39
  • [28] An Implementation of Object-based Storage System Access Control Based on IBE
    Chen, Junjian
    Feng, Dan
    Liu, Jingning
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 635 - 639
  • [29] Efficient Policy Analysis for Administrative Role Based Access Control
    Stoller, Scott D.
    Yang, Ping
    Ramakrishnan, C. R.
    Gofman, Mikhail I.
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 445 - +
  • [30] Efficient role based access control method in wireless environment
    Chae, S
    Kim, W
    Kim, D
    PERSONAL WIRELESS COMMUNICATIONS, PROCEEDINGS, 2004, 3260 : 431 - 439