Access control based on RBAC in distributed cooperation environment

被引:0
|
作者
Yin Shao-hong [1 ]
Wang Wei [2 ]
机构
[1] Tianjin Polytech Univ, Sch Comp Tech & Automizat, Tianjin, Peoples R China
[2] Tianjin Polytech Univ, Sch Informat & Commun Engn, Tianjin, Peoples R China
关键词
D O I
10.1109/ISDPE.2007.14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The distributed cooperation environment is applied more and more in many departments and enterprises. But the traditional RBAC96 model can't resolve the access control problems in the distributed cooperation environment. Based on the traditional RBAC96 model, this paper proposes the dRBAC model which adds delegation mechanism contrast to the RBAC96 model. This model can efficiently resolve the access control problem in the distributed cooperation environment.
引用
收藏
页码:119 / +
页数:2
相关论文
共 50 条
  • [31] Distributed access control based on CORBA
    Tan, Wen-Fang
    Hu, Nan-Jun
    Chen, Gui-Hai
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2001, 22 (11):
  • [32] Owner-Based Role-Based Access Control OB-RBAC
    Saffarian, Mohsen
    Sadighi, Babak
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 236 - 241
  • [33] A collaborative role-based access control for trusted operating systems in distributed environment
    Kim, HC
    Ramakrishna, RS
    Sakurai, K
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (01) : 270 - 279
  • [34] Trust Level Based Data Storage and Data Access Control in a Distributed Storage Environment
    Roos, Andreas
    Druesedow, Steffen
    Hosseini, Mahya Ilaghi
    Coskun, Goekhan
    Zickau, Sebastian
    2015 3RD IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2015), 2015, : 169 - 176
  • [35] Mining Attribute-Based Access Control Policies from RBAC Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    2013 10TH INTERNATIONAL CONFERENCE AND EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2013,
  • [36] Management advantages of object classification in role-based access control (RBAC)
    Jafari, Mohammad
    Fathian, Mohammad
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 95 - 110
  • [37] I-RBAC: An identity& role based access control model
    Wang, Jin
    Li, Qiang
    Li, Daxing
    2007 IEEE INTERNATIONAL CONFERENCE ON CONTROL AND AUTOMATION, VOLS 1-7, 2007, : 1176 - +
  • [38] Based on Expand RBAC Grid Collaborative Design System Access Control Model
    Chen, Xuebin
    Duan, Guolin
    Cai, Jin
    ICHIT 2008: INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 217 - 221
  • [39] uT-RBAC: Ubiquitous role-based access control model
    Chae, SH
    Kim, W
    Kim, DK
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01): : 238 - 239
  • [40] Platform for access control management in information system based on extended RBAC model
    Poniszewska-Maranda, Aneta
    12TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2010), 2011, : 510 - 517