Computer Science ›› 2014, Vol. 41 ›› Issue (Z6): 429-432.

Previous Articles     Next Articles

Design of the RBAC-based Access Control Model in the Complex Information Systems

QIANG Zhen-ping,HE Li-bo,CHEN xu and LI Tong   

  • Online:2018-11-14 Published:2018-11-14

Abstract: To the complexity control problems in a complex information systems which was usually caused by the mana-gement of large numbers roles and the dynamically changing of the user’s responsibilities attributes,in this paper,we based on the full consideration of the relationship between the user’s authorization and the form of the use’s organization,used the organization and group as the main body to assigned the roles,and increasing the resource access permissions scope defined in information system,we proposed an improved RBAC model and designed the realized data relationships.Practical results show that not only can be easily complete the authorization which caused by the responsibilities changing of the organization and groups,and can quickly respond to the change of the property caused by the personnel duty,at the same time can flexibly achieve the resource access permissions.

Key words: Role-based access control,Access control,Authority management,Resource management,User group

[1] Sandhu R,Coyne E,Feinstein H.Role-based Access ControlModels[J].IEEE Computer,1996,9(6):38-47
[2] Fereaiolo D F,Sandhu R,Gavrila S,et al.Proposed NIST Stan-dard for Role-Based Access Control[J].ACM Transactions on Information and System Security,2001,4(3):224-274
[3] ANSI.American National Standard for Information Technolo-gy—Role Based Access Control[C]∥ANSI Int’l Committee for Information Technology Standards.Feb.2004:359
[4] 刘强,王磊,何琳.RBAC模型研究历程中的系列问题分析[J].计算机科学,2012,39(11):13-18
[5] 沈海波,洪帆.访问控制模型研究综述[J].计算机应用研究,2005(6):9-11
[6] 李凤华,史国振,马建峰.访问控制模型研究进展及发展趋势[J].电子学报,2012,40(4):805-813
[7] Sandhu R,Bhamidipadi V.The URA97 Model for Role-BasedUser-Role Assignment,Database Security XI:Status and Prospects[J].Chapman & Hall,1998
[8] Sandhu R,Bhamidipati V,Munawer Q.The ARBAC97 modelfor role-based administration of roles[J].ACM Transactions on Information and System Security,1999,2(1):105-135
[9] Sandhu R,Munawer Q.The ARBAC99model for administration of roles[C]∥Proceedings of the Annual Computer Security Applications Conference.Phoenix,USA,1999
[10] Sandhu R,Munawer Q.A Model for Role Administration Using Organization[C]∥Proceedings of the SACMAT’02.Monterey,California,USA,2002:155-162
[11] Zhang Xin-wen,Oh S,Sandhu R.PBDM:A Flexible Delegation Model in RBAC[C]∥Proceedings of SACMAT’03.Como,Italy,2003:149-157
[12] 朱君.角色协同中群体感知和访问控制技术研究[D].广州:中山大学,2009
[13] Yuan E,Tong J.Attributed based access control(ABAC) for Web services[C]∥ 2005IEEE International Conference on Web Services,2005(ICWS 2005).2005:11-15
[14] Xin J,Krishnan R,Sandhu R.A Role-Based AdministrationModel for Attributes[C]∥Proc.1st Int’l Workshop Secure and Resilient Architectures and Systems.ACM,2012:7-12
[15] Coyne E,Weil T R.ABAC and RBAC:Scalable,Flexible,andAuditable Access Management[J].IEEE Computer Society,IT Professional,2013,5(3):14-16
[16] Kirkpatrick M S,Bertino E.Enforcing Spatial Constraints forMobile RBAC Systems[C]∥Symposium on Access Control Models and Technologies-SACMAT.2010:99-108
[17] Kirkpatrick M S,Damiani M L,Bertino E.Prox-RBAC:a proxi-mity-based spatially aware RBAC[C]∥Proceedings of GIS.2011:339-348

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!