An Expanded Model of Role-Based Access Model Based on Resource Model

被引:0
|
作者
Liang, Zhi-hong [1 ]
Sun, Xing-ping [1 ]
Chen, Qing-yi [1 ]
Hu, Jun-hua [2 ]
Sun, Shu-qiong [2 ]
机构
[1] Yunnan Univ, Sch Software, Kunming 650091, Yunnan, Peoples R China
[2] Key Lab Software Engn Yunnan Prov Republ China, Kunming 650091, Yunnan, Peoples R China
关键词
RBAC; Accessing control; Resource model;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the RBAC model, a resource is represented by an object. As there is close connectivity between objects and operation, the resources accessing control authorization is inconvenient. This paper extends the RBAC object model to the resource model while the resource elements, abstract resources and resource bundles are defined in the resource model. The RBAC operating model is extended and the concept of abstract operations and the operating bundles are proposed. In addition, the relationship between resources and operations are discussed and the grading of the resource and role is proposed.
引用
收藏
页码:1044 / 1053
页数:10
相关论文
共 50 条
  • [1] Role-based access control model for GIS
    Pan, Yuqing
    Sheng, Yehua
    Zhou, Jieyu
    GEOINFORMATICS 2007: GEOSPATIAL INFORMATION TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6754
  • [2] A Role-Based Workflow Access Control Model
    Zhang Wen-dong
    Zhang Kai-ji
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 1136 - 1139
  • [3] A role-based access control model for information mediation
    Yang, L
    Ege, RK
    Ezenwoye, O
    Kharma, Q
    PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 277 - 282
  • [4] A generalized temporal role-based access control model
    Joshi, JBD
    Bertino, E
    Latif, U
    Ghafoor, A
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (01) : 4 - 23
  • [5] Role-based access control model for CSCW systems
    Li, Chengkai
    Zhan, Yongzhao
    Mao, Bing
    Xie, Li
    Ruan Jian Xue Bao/Journal of Software, 2000, 11 (07): : 931 - 937
  • [6] Attributes Enhanced Role-Based Access Control Model
    Rajpoot, Qasim Mahmood
    Jensen, Christian Damsgaard
    Krishnan, Ram
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 3 - 17
  • [7] A formal model for role-based access control with constraints
    Giuri, L
    Iglio, P
    9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 136 - 145
  • [8] A formal model for parameterized role-based access control
    Abdallah, AE
    Khayat, EJ
    FORMAL ASPECTS IN SECURITY AND TRUST, 2005, 173 : 233 - 246
  • [9] The Research for Spatial Role-Based Access Control Model
    Zou, Zhiwen
    Chen, Changqian
    Ju, Shiguang
    Chen, Jiming
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 4, PROCEEDINGS, 2010, 6019 : 296 - 308
  • [10] A role-based multilevel security access control model
    Pan, L
    Zhang, CN
    Yang, CG
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2006, 46 (03) : 1 - 10