Role-Based Access Control Model as Applied to Object-Oriented Applications

被引:0
|
作者
Oleynik, Pavel P. [1 ]
机构
[1] Platov South Russian State Polytech Univ NPI, Rostov Na Donu, Russia
关键词
UML; OOP; OOD; Security Model; DB; SECURITY;
D O I
暂无
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
The article presents an overview of modern approaches to setting up of security and allocation of user access rights in applications of different architecture and the author's approach to allocation of rights to classes, class attributes and objects, complying with specific criteria. It is achieved with the use of hierarchy of classes, the composition and structure of which are described in detail herein. Concluding part of the article contains description of already developed applications, in which the author employed the model.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Research on object-oriented role-based access control model
    Luo, JY
    He, DK
    [J]. PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT'2003, PROCEEDINGS, 2003, : 132 - 135
  • [2] Embedding role-based access control model in object-oriented systems to protect privacy
    Chou, SC
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 71 (1-2) : 143 - 161
  • [3] An object-oriented organizational model to support dynamic role-based access control in electronic commerce
    Cheng, EC
    [J]. DECISION SUPPORT SYSTEMS, 2000, 29 (04) : 357 - 369
  • [4] Applications of the oriented permission role-based access control model
    Chen, Liang
    Crampton, Jason
    [J]. 2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2007, : 387 - +
  • [5] Integrating object oriented role-based access control model with mandatory access control principles
    Zhang, CN
    Yang, CG
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2003, 43 (03) : 40 - 49
  • [6] Role-based exploration of object-oriented programs
    Demsky, B
    Rinard, M
    [J]. ICSE 2002: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 2002, : 313 - 324
  • [7] Extensible and reusable role-based object-oriented security
    Demurjian, SA
    Ting, TC
    Price, M
    Hu, MY
    [J]. DATABASE SECURITY VOLUME X - STATUS AND PROSPECTS, 1997, : 288 - 307
  • [8] Access control model in object-oriented systems
    Izaki, K
    Tanaka, K
    Takizawa, M
    [J]. SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS: WORKSHOPS, PROCEEDINGS, 2000, : 69 - 74
  • [9] Object-Specific Role-Based Access Control
    Mundbrod, Nicolas
    Reichert, Manfred
    [J]. INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS, 2019, 28 (01)
  • [10] Service-oriented role-based access control
    Xu, Feng
    Lai, Hai-Guang
    Huang, Hao
    Xie, Li
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2005, 28 (04): : 686 - 693