Role-Based Access Control Models in E-Government

被引:0
|
作者
Yu, Zheng [1 ]
机构
[1] Guizhou Univ Finance & Econ, Collage Informat, Guiyang 550025, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Role-Based Access Control Models (RBAC) as the perfect replacer of the traditional access control, the characteristic which is high performance, convenient, flexible apply well in authorization management of Information System. This paper introduces RBAC, analysis the relationship among User, Role and Permission, then presents a scheme based RBAC which is implemented in an e-Government Information System and gives the scheme of this method by using UML. The running state of this e-Government Information System shows the design of scheme and realization is reasonable and convenient, also is a reference scheme to access control of other Information System.
引用
收藏
页码:499 / 506
页数:8
相关论文
共 50 条
  • [41] Elements of a language for role-based access control
    Hitchens, M
    Varadharajan, V
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 371 - 380
  • [42] Role-based access control model for GIS
    Pan, Yuqing
    Sheng, Yehua
    Zhou, Jieyu
    GEOINFORMATICS 2007: GEOSPATIAL INFORMATION TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6754
  • [43] Modal logic for role-based access control
    Kosiyatrakul, T
    Older, S
    Chin, SK
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 179 - 193
  • [44] Garbled role-based access control in the cloud
    Masoom Alam
    Naina Emmanuel
    Tanveer Khan
    Yang Xiang
    Houcine Hassan
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1153 - 1166
  • [45] Cryptographic Enforcement of Role-Based Access Control
    Crampton, Jason
    FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 191 - 205
  • [46] Hierarchical role-based access control development
    Kolegov, D. N.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2012, 17 (03): : 70 - 76
  • [47] Role-based access control for web services
    College of Information Sciences and Technology, Donghua University, 1882 Yan'an Road , Shanghai 200051, China
    WSEAS Trans. Inf. Sci. Appl., 2006, 8 (1553-1558):
  • [48] λ-RBAC: PROGRAMMING WITH ROLE-BASED ACCESS CONTROL
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    LOGICAL METHODS IN COMPUTER SCIENCE, 2008, 4 (01)
  • [49] Concurrency and Time in Role-Based Access Control
    Chiang, Chia-Chu
    Bayrak, Coskun
    ADVANCES IN INFORMATION SECURITY AND ITS APPLICATION, 2009, 36 : 37 - 42
  • [50] Role-Based Access Control Modeling and Validation
    Haraty, Ramzi A.
    Naous, Mirna
    2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,