Role-Based Access Control Models in E-Government

被引:0
|
作者
Yu, Zheng [1 ]
机构
[1] Guizhou Univ Finance & Econ, Collage Informat, Guiyang 550025, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Role-Based Access Control Models (RBAC) as the perfect replacer of the traditional access control, the characteristic which is high performance, convenient, flexible apply well in authorization management of Information System. This paper introduces RBAC, analysis the relationship among User, Role and Permission, then presents a scheme based RBAC which is implemented in an e-Government Information System and gives the scheme of this method by using UML. The running state of this e-Government Information System shows the design of scheme and realization is reasonable and convenient, also is a reference scheme to access control of other Information System.
引用
收藏
页码:499 / 506
页数:8
相关论文
共 50 条
  • [31] Homonymous role in role-based discretionary access control
    Chu, Xiaowen
    Kai Ouyang
    Chen, Hsiao-Hwa
    Liu, Jiangchuan
    Jiang, Yixin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2009, 9 (09): : 1287 - 1300
  • [32] On the homonymous role in role-based discretionary access control
    Ouyang, Kai
    Chu, Xiaowen
    Jiang, Yixin
    Chen, Hsiao-Hwa
    Liu, Jiangchuan
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 313 - +
  • [33] Research on Access-control Model in E-Government workflow
    Li Duan-Ming
    Li Yu-Xiang
    ICFCSE 2011: 2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SUPPORTED EDUCATION, VOL 1, 2011, : 474 - 477
  • [34] The Research of Group Hierarchy Access Control in E-Government System
    Qin, Shengjun
    Li, Kene
    RESEARCH IN MATERIALS AND MANUFACTURING TECHNOLOGIES, PTS 1-3, 2014, 835-836 : 1840 - 1843
  • [35] Extending a Role Graph for Role-Based Access Control
    Asakura, Yoshiharu
    Nakamoto, Yukikazu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (02): : 211 - 219
  • [36] Role-based access control in TOBIAS and NESS
    Marshall, LF
    IEE PROCEEDINGS-SOFTWARE, 2006, 153 (01): : 4 - 6
  • [37] Role-based access control for boxed ambients
    Compagnoni, Adriana
    Gunter, Elsa L.
    Bidinger, Philippe
    THEORETICAL COMPUTER SCIENCE, 2008, 398 (1-3) : 203 - 216
  • [38] Role-based access control consistency validation
    Centonze, Paolina
    Naumovich, Gleb
    Fink, Stephen J.
    Pistoia, Marco
    Proc. Int. Symp. Softw. Test. Anal. ISSTA, (121-131):
  • [39] Rights management for role-based access control
    Bouwman, Bart
    Mauw, Sjouke
    Petkovic, Milan
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 1085 - +
  • [40] Resource hierarchies for role-based access control
    Wolf, A
    Von Hammel-Bonten, C
    Köhlmann, M
    Würfel, U
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VI, PROCEEDINGS: INDUSTRIAL SYSTEMS AND ENGINEERING I, 2002, : 195 - 200