An access control of enterprise financial privacy information based on RBAC model

被引:0
|
作者
Shi, Xuejiao [1 ]
机构
[1] Jiyuan Vocat & Tech Coll, Sch Econ Management, Jiyuan, Henan, Peoples R China
关键词
RBAC model; corporate finance; privacy information; access control; anomaly analysis;
D O I
10.1504/IJCAT.2024.143307
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
It is essential to improve the Role-Based Access Control (RBAC) method for controlling access to enterprise financial privacy information. First, this study proposes to solve the problem of information leakage and distortion in the acquisition of corporate financial privacy information. Then the statistical characteristics of private information resources are analysed by entropy analysis method. Secondly, the privacy information access anomaly analysis is completed. Finally, the RBAC model is built on this basis, and the multi-agent technology is introduced to ensure the user's privacy access. This approach aims to enhance the security and management effectiveness of enterprise financial privacy information and achieve access control to enterprise financial privacy information. Experimental results indicate that the proposed method can effectively reduce information leakage and distortion issues. However, it should be noted that due to legal and ethical considerations, it is necessary to adhere to data protection laws and regulations in implementing these access control measures.
引用
收藏
页码:372 / 381
页数:11
相关论文
共 50 条
  • [21] An access control model for the adhocracy organization using RBAC
    Shim, WB
    Park, S
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (01): : 165 - 175
  • [22] Controlling information access in workflow management systems using RBAC-based model
    Chou, Shih-Chien
    Wu, Chien-Jung
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2007, 30 (02) : 331 - 336
  • [23] The Financial Reporting Model in Enterprise Financial Management Information Collaborative Model
    An Wenying
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON PUBLIC ECONOMICS AND MANAGEMENT (ICPEM 2009), VOL 5: STATISTICS AND METHODOLOGY, 2009, : 110 - 113
  • [24] Access control based on RBAC in distributed cooperation environment
    Yin Shao-hong
    Wang Wei
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 119 - +
  • [25] Application of access control based on PKI and PMI in enterprise information system
    Lei, Jianyun
    Jiang, Tianfa
    Xing, Guanglin
    Wuhan Ligong Daxue Xuebao (Jiaotong Kexue Yu Gongcheng Ban)/Journal of Wuhan University of Technology (Transportation Science and Engineering), 2008, 32 (04): : 711 - 714
  • [26] λ-RBAC: PROGRAMMING WITH ROLE-BASED ACCESS CONTROL
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    LOGICAL METHODS IN COMPUTER SCIENCE, 2008, 4 (01)
  • [27] λ-RBAC:: Programming with role-based access control
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 456 - 467
  • [28] A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC
    Jin, Xin
    Krishnan, Ram
    Sandhu, Ravi
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 41 - 55
  • [29] UC-RBAC: A usage constrained role-based access control model
    Xu, Z
    Feng, DG
    Li, L
    Chen, H
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 337 - 347
  • [30] Dynamic permission access control model based on privacy protection
    Qikun Zhang
    Liang Zhu
    Kunyuan Zhao
    Yimeng Wu
    Baohua Jin
    Jianyong Li
    Yinghui Meng
    Sikang Hu
    Telecommunication Systems, 2022, 81 : 191 - 205