An access control of enterprise financial privacy information based on RBAC model

被引:0
|
作者
Shi, Xuejiao [1 ]
机构
[1] Jiyuan Vocat & Tech Coll, Sch Econ Management, Jiyuan, Henan, Peoples R China
关键词
RBAC model; corporate finance; privacy information; access control; anomaly analysis;
D O I
10.1504/IJCAT.2024.143307
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
It is essential to improve the Role-Based Access Control (RBAC) method for controlling access to enterprise financial privacy information. First, this study proposes to solve the problem of information leakage and distortion in the acquisition of corporate financial privacy information. Then the statistical characteristics of private information resources are analysed by entropy analysis method. Secondly, the privacy information access anomaly analysis is completed. Finally, the RBAC model is built on this basis, and the multi-agent technology is introduced to ensure the user's privacy access. This approach aims to enhance the security and management effectiveness of enterprise financial privacy information and achieve access control to enterprise financial privacy information. Experimental results indicate that the proposed method can effectively reduce information leakage and distortion issues. However, it should be noted that due to legal and ethical considerations, it is necessary to adhere to data protection laws and regulations in implementing these access control measures.
引用
收藏
页码:372 / 381
页数:11
相关论文
共 50 条
  • [41] Research on an Access Control Model for Radio and Television Monitoring Software Based on T-RBAC
    Wang, Zizhe
    Tian, Pei
    Jin, Xiang
    MECHANICAL DESIGN AND POWER ENGINEERING, PTS 1 AND 2, 2014, 490-491 : 1531 - 1535
  • [42] Deploying Privacy Improved RBAC in Web Information Systems
    Mavridis, Ioannis
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGIES AND SYSTEMS APPROACH, 2011, 4 (02) : 70 - 87
  • [43] Enterprise model as a basis of administration on role-based access control
    Oh, S
    Park, S
    PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON COOPERATIVE DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, 2000, : 150 - 158
  • [44] Research on an SOA-based Virtual Enterprise Access Control Model
    Chen, Dejun
    Hu, Rui
    Du, Zhu
    Zhou, Zude
    Ji, C.
    2009 7TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1 AND 2, 2009, : 871 - +
  • [45] Differential Privacy Based Access Control
    Metoui, Nadia
    Bezzi, Michele
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2016 CONFERENCES, 2016, 10033 : 962 - 974
  • [46] Security and privacy based access control model for internet of connected vehicles
    Habib, Muhammad Asif
    Ahmad, Mudassar
    Jabbar, Sohail
    Khalid, Shehzad
    Chaudhry, Junaid
    Saleem, Kashif
    Rodrigues, Joel J. P. C.
    Khalil, Muhammad Sayim
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 97 : 687 - 696
  • [47] Fine Grained Attribute Based Access Control Model for Privacy Protection
    Que Nguyet Tran Thi
    Tran The Si
    Tran Khanh Dang
    FUTURE DATA AND SECURITY ENGINEERING, FDSE 2016, 2016, 10018 : 305 - 316
  • [48] Knowledge Based Access Control a model for security and privacy in the Big Data
    El haourani, Lamia
    Abou elkalam, Anas
    Ouahman, Abdelah Ait
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON SMART CITY APPLICATIONS (SCA'18), 2018,
  • [49] Privacy Preserving for Patients' Information: A Knowledge-Constrained Access Control Model for Hospital Information Systems
    Zhang, Runtong
    Chen, Donghua
    Shang, Xiaopu
    2016 IEEE 14TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2016, : 921 - 926
  • [50] A Dynamic Privacy Aware Access Control Model for Location Based Services
    Karimi, Leila
    Palanisamy, Balaji
    Joshi, James
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (IEEE CIC), 2016, : 554 - 557