The implementation of role-based access control on the web

被引:0
|
作者
Xu, CG [1 ]
Yan, H [1 ]
Liu, FG [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Sci, Nanjing 210094, Jiangsu, Peoples R China
关键词
role; model; access control; Cookies;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Role-based access control(RBAC) is a promising technology for managing and enforcing security in large-scale enterprise-wide system, we were motivated by the need to manage and enforce the strong access control technology of RBAC in large-scale Web environments. Majority of traditional access control models were passive data-protections, which were not suitable for large and complex multi-user interactive applications. In this paper, we develop a general model to control users' behaviors based on their roles actively. In the model, users' behavior specifications are built on their roles. Role-Playing is introduced to denote activated role in particular context. Role-Playing is modeled as an active class, and its object interacts with user and controls user's behaviors actively. Cookies can be used to support RBAC on the Meb, holding users'role information. However, it is insecure to store and transmit sensitive in rmation in cookies. Cookies are stored and transmitted in clear text, which is readable and easily forged. In this paper, we describe an implementation of Role-Based Access Control on the Web by secure cookies.
引用
收藏
页码:D251 / D255
页数:5
相关论文
共 50 条
  • [1] Role-based access control on the web using LDAP
    Park, JS
    Ahn, GJ
    Sandhu, R
    [J]. DATABASE AND APPLICATION SECURITY XV, 2002, 87 : 19 - 30
  • [2] Role-based access control system for web services
    Feng, X
    Guoyuan, L
    Hao, H
    Li, X
    [J]. FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2004, : 357 - 362
  • [3] An extended role-based access control for Web services
    Zhu, Yi-qun
    Li, Jian-hua
    Zhang, Quan-hai
    [J]. SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 471 - +
  • [4] Application of Role-Based Access Control for Web Environment
    Robles, Rosslin John
    Choi, Min-Kyu
    Yeo, Sang-Soo
    Kim, Tai-hoon
    [J]. INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 171 - +
  • [5] Securing the Web of Things with Role-Based Access Control
    Barka, Ezedine
    Mathew, Sujith Samuel
    Atif, Yacine
    [J]. CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 14 - 26
  • [6] Role-based access control on the web using Java']Java™
    Giuri, L
    [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 11 - 18
  • [7] Integrating Role-Based Access Control Model with Web Server
    Li, Celia
    Yang, Cungang
    Qin, Ling
    Yang, Yiguang
    [J]. 2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009), 2009, : 615 - 618
  • [8] Role-Based Access Control Implementation Using Prime Numbers
    Sahafizadeh, Ebrahim
    Sartoly, Sara
    Chamkoori, Alireza
    [J]. SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, VOL 1, PROCEEDINGS, 2009, : 234 - +
  • [9] Design and Implementation of Dynamic Menu Based on Role-Based Access Control
    Chen, Ying
    Yang, Fengyu
    [J]. MATERIALS PROCESSING AND MANUFACTURING III, PTS 1-4, 2013, 753-755 : 2990 - 2994
  • [10] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157