A Policy Based Access Control Model of PDM System

被引:0
|
作者
Ye, C. X. [1 ]
Fu, Y. Q. [2 ]
机构
[1] Chongqing Univ, Coll Comp Sci, Chongqing, Peoples R China
[2] Chongqing Univ, Coll Software Engn, Chongqing, Peoples R China
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
PDM; Security; Access Control; Access Control Policy;
D O I
10.4028/www.scientific.net/MSF.626-627.735
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In PDM system, there exist many users, such as employees, partners, and customers. To protect resource from illegal access, it is very important to enforce access control policy in PDM system. RBAC is widely used as an access control model in PDM system But, it is difficult for RBAC to support complex access control policy This paper proposed a simple, flexible way to express and enforce access control policy To keep the integrity of system security and make the system administer work easier, we propose auto revocation triggered by time and access control policy in our model At the end of this paper Introduces a system architecture and auto revocation algorithm. We also give some examples to show how this model works in PDM system
引用
收藏
页码:735 / +
页数:2
相关论文
共 50 条
  • [31] Data access control policy of encrypted deduplication system
    Jia C.
    Ha G.
    Li R.
    1600, Editorial Board of Journal on Communications (41): : 72 - 83
  • [32] A double access control model for web services based information system
    Chen, Xueqin
    Wu, Huizhong
    Zhu, Yaoqin
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 1045 - 1050
  • [33] Trust based access control model for securing electronic healthcare system
    Singh, Ashish
    Chatterjee, Kakali
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (11) : 4547 - 4565
  • [34] Role-based access control hierarchy model in distributed system
    Hong, Fan
    Wu, Min
    2003, Huazhong University of Science and Technology (31):
  • [35] An access control model based on organization and task in workflow for power system
    Wang, Baoyi
    Yu, Xiaobo
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2007, 31 (04): : 51 - 55
  • [36] Trust based access control model for securing electronic healthcare system
    Ashish Singh
    Kakali Chatterjee
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 4547 - 4565
  • [37] Task-Role Based Dual System Access Control Model
    Zhang, Cui-xiao
    Hu, Ying-xin
    Zhang, Guo-bing
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (7B): : 211 - 215
  • [38] A Task-and-Role-Based Access Control Model for Workflow System
    yi, Xu
    DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 843 - 846
  • [39] Cascading Permissions Policy Model for Token-Based Access Control in the Web of Things
    Amir, Mohammad
    Pillai, Prashant
    Hu, Yim-Fun
    2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD), 2014, : 238 - 245
  • [40] A Universal Model for Policy-Based Access Control-enabled Ubiquitous Computing
    Jing, Yixin
    Kim, Jinhyung
    Jeong, Dongwon
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2006, 2 (01): : 28 - 33