Role-Based Access Control Models in E-Government

被引:0
|
作者
Yu, Zheng [1 ]
机构
[1] Guizhou Univ Finance & Econ, Collage Informat, Guiyang 550025, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Role-Based Access Control Models (RBAC) as the perfect replacer of the traditional access control, the characteristic which is high performance, convenient, flexible apply well in authorization management of Information System. This paper introduces RBAC, analysis the relationship among User, Role and Permission, then presents a scheme based RBAC which is implemented in an e-Government Information System and gives the scheme of this method by using UML. The running state of this e-Government Information System shows the design of scheme and realization is reasonable and convenient, also is a reference scheme to access control of other Information System.
引用
收藏
页码:499 / 506
页数:8
相关论文
共 50 条
  • [1] A Role-Based PMI Security Model for E-Government
    WU Li-jun
    Wuhan University Journal of Natural Sciences, 2005, (01) : 329 - 332
  • [2] Role-based PMI security model for E-government
    Wu, Li-Jun
    Su, Kai-Le
    Yang, Zhi-Hua
    Wuhan University Journal of Natural Sciences, 2005, 10 (01) : 329 - 332
  • [3] Role-Based Access Control Models for Android
    Talegaon, Samir
    Krishnan, Ram
    2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, : 179 - 188
  • [4] Role-Based and Service-Oriented Security Management in the E-Government Environment
    Yu, Chien-Chih
    ELECTRONIC GOVERNMENT, PROCEEDINGS, 2009, 5693 : 364 - 375
  • [5] Future directions in role-based access control models
    Sandhu, R
    INFORMATION ASSURANCE IN COMPUTER NETWORKS: METHODS, MODELS AND ARCHITECTURES FOR NETWORK SECURITY, PROCEEDINGS, 2001, 2052 : 22 - 26
  • [6] Delta Analysis of Role-Based Access Control Models
    Leitner, Maria
    COMPUTER AIDED SYSTEMS THEORY, PT 1, 2013, 8111 : 507 - 514
  • [7] E-Government information security in the web environment based on Role Based Access Control technology
    Zeng Zhongping
    Chen Tao
    Zhang Yi
    ISBIM: 2008 INTERNATIONAL SEMINAR ON BUSINESS AND INFORMATION MANAGEMENT, VOL 1, 2009, : 210 - +
  • [8] Role-based access control
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [9] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [10] Role-Based Access Control and the Access Control Matrix
    Saunders, G.
    Hitchens, M.
    Varadharajan, V.
    2001, Association for Computing Machinery (35):