A Policy Based Access Control Model of PDM System

被引:0
|
作者
Ye, C. X. [1 ]
Fu, Y. Q. [2 ]
机构
[1] Chongqing Univ, Coll Comp Sci, Chongqing, Peoples R China
[2] Chongqing Univ, Coll Software Engn, Chongqing, Peoples R China
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
PDM; Security; Access Control; Access Control Policy;
D O I
10.4028/www.scientific.net/MSF.626-627.735
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In PDM system, there exist many users, such as employees, partners, and customers. To protect resource from illegal access, it is very important to enforce access control policy in PDM system. RBAC is widely used as an access control model in PDM system But, it is difficult for RBAC to support complex access control policy This paper proposed a simple, flexible way to express and enforce access control policy To keep the integrity of system security and make the system administer work easier, we propose auto revocation triggered by time and access control policy in our model At the end of this paper Introduces a system architecture and auto revocation algorithm. We also give some examples to show how this model works in PDM system
引用
收藏
页码:735 / +
页数:2
相关论文
共 50 条
  • [1] Supporting Complex Access Control Policy in PDM System
    Ye, Chunxiao
    Fu, Yunqing
    Xiang, Hong
    E-ENGINEERING & DIGITAL ENTERPRISE TECHNOLOGY VII, PTS 1 AND 2, 2009, 16-19 : 703 - 707
  • [2] An Efficient Role and Object Based Access Control Model Implemented in a PDM System
    HUANG Xiaowen TAN Jian HUANG Xiangguo School of Mechantronic EngineeringWuhan University of TechnologyWuhan China
    武汉理工大学学报, 2006, (S3) : 788 - 791
  • [3] An efficient role and object based access control model implemented in a PDM system
    Huang Xiaowen
    Tan Jian
    Huang Xiangguo
    1st International Symposium on Digital Manufacture, Vols 1-3, 2006, : 788 - 791
  • [4] Policy-based access control model for mobile agent system
    Chen Xiao-su
    Lin Zhi
    2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1222 - 1225
  • [5] Research on Policy-based Access Control Model
    Lin Zhi
    Wang Jing
    Chen Xiao-su
    Jia Lian-xing
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 164 - +
  • [6] Towards Policy Retrieval for Provenance Based Access Control Model
    Pei, Jisheng
    Ye, Xiaojun
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 769 - 776
  • [7] Policy-Based Access Control System for Delta Lake
    Chen, Zhe
    Shao, Hangyu
    Li, Yuping
    Lu, Hongru
    Jin, Jiahui
    2022 TENTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA, CBD, 2022, : 60 - 65
  • [8] A Flexible Policy-Based Access Control Model for Workflow
    Ma, Gang
    Wu, Kehe
    Zhang, Tong
    Li, Wei
    PRZEGLAD ELEKTROTECHNICZNY, 2012, 88 (3B): : 67 - 71
  • [9] Multi-policy access control model for workflow management system
    Yu, Ling
    Chen, Bo
    Xiao, Jun-Mo
    Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice, 2009, 29 (02): : 151 - 158
  • [10] An Alarm Based Access Control Model for SCADA System
    Nasr, Payam Mahmoudi
    Varjani, Ali Yazdian
    2015 SMART GRID CONFERENCE (SGC 2015), 2015, : 145 - 151