An access control of enterprise financial privacy information based on RBAC model

被引:0
|
作者
Shi, Xuejiao [1 ]
机构
[1] Jiyuan Vocat & Tech Coll, Sch Econ Management, Jiyuan, Henan, Peoples R China
关键词
RBAC model; corporate finance; privacy information; access control; anomaly analysis;
D O I
10.1504/IJCAT.2024.143307
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
It is essential to improve the Role-Based Access Control (RBAC) method for controlling access to enterprise financial privacy information. First, this study proposes to solve the problem of information leakage and distortion in the acquisition of corporate financial privacy information. Then the statistical characteristics of private information resources are analysed by entropy analysis method. Secondly, the privacy information access anomaly analysis is completed. Finally, the RBAC model is built on this basis, and the multi-agent technology is introduced to ensure the user's privacy access. This approach aims to enhance the security and management effectiveness of enterprise financial privacy information and achieve access control to enterprise financial privacy information. Experimental results indicate that the proposed method can effectively reduce information leakage and distortion issues. However, it should be noted that due to legal and ethical considerations, it is necessary to adhere to data protection laws and regulations in implementing these access control measures.
引用
收藏
页码:372 / 381
页数:11
相关论文
共 50 条
  • [31] HECC based Patient Privacy Preserving Access Control Model
    Prasanalakshmi, B.
    Pugalendhi, Ganesh Kumar
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (03): : 50 - 53
  • [32] Dynamic permission access control model based on privacy protection
    Zhang, Qikun
    Zhu, Liang
    Zhao, Kunyuan
    Wu, Yimeng
    Jin, Baohua
    Li, Jianyong
    Meng, Yinghui
    Hu, Sikang
    TELECOMMUNICATION SYSTEMS, 2022, 81 (02) : 191 - 205
  • [33] An access control model of workflow system integrating RBAC and TBAC
    Zhou, Xiangning
    Wang, Zhaolong
    INTEGRATION AND INNOVATION ORIENT TO E-SOCIETY, VOL 2, 2007, 252 : 246 - +
  • [34] Research on Improved RBAC Model and its Access Control Strategy
    Shi, Lei
    Sun, Shouqian
    Yuan, Jun
    9TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED INDUSTRIAL DESIGN & CONCEPTUAL DESIGN, VOLS 1 AND 2: MULTICULTURAL CREATION AND DESIGN - CAID& CD 2008, 2008, : 1067 - +
  • [35] An access control model of workflow system integrating RBAC and TBAC
    School of Information and Electronic Engineering, ShanDong Institute of Business and Technology, Yantai
    264005, China
    不详
    264005, China
    IFIP Advances in Information and Communication Technology, 2007, (246-251)
  • [36] The research of the enterprise financial model based on information entropy and correlation model reorganization theory
    Zhang Yinping
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA AND SMART CITY (ICITBS), 2016, : 910 - 913
  • [37] Privacy Policies Model in Access Control
    Werner, Jorge
    Westphall, Carla Merkle
    Vargas, Andre Azevedo
    Westphall, Carlos Becker
    2019 13TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2019,
  • [38] Research on Enterprise Financial Accounting Information Security Model Based on Big Data
    Zhong, Ran
    Zhang, Qianying
    Zhao, Yachao
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [39] DS RBAC - Dynamic Sessions in Role Based Access Control
    Muehlbacher, Joerg R.
    Praher, Christian
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2009, 15 (03) : 538 - 554
  • [40] Role-based Access Control (RBAC) Authorization in Kubernetes
    Rostami G.
    Journal of ICT Standardization, 2023, 11 (03): : 237 - 260