Role-Based Access Control Model as Applied to Object-Oriented Applications

被引:0
|
作者
Oleynik, Pavel P. [1 ]
机构
[1] Platov South Russian State Polytech Univ NPI, Rostov Na Donu, Russia
关键词
UML; OOP; OOD; Security Model; DB; SECURITY;
D O I
暂无
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
The article presents an overview of modern approaches to setting up of security and allocation of user access rights in applications of different architecture and the author's approach to allocation of rights to classes, class attributes and objects, complying with specific criteria. It is achieved with the use of hierarchy of classes, the composition and structure of which are described in detail herein. Concluding part of the article contains description of already developed applications, in which the author employed the model.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Access Differentiation in Object-Oriented Databases Based on the Extended Object-Oriented Harrison-Ruzzo-Ullman Model
    Glukharev, M. L.
    Solomatova, M. F.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2020, 54 (08) : 1007 - 1012
  • [22] A criterion-based role-based multilayer access control model for multimedia applications
    Pan, Leon
    Zhang, Chang N.
    ISM 2006: EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, PROCEEDINGS, 2006, : 145 - +
  • [23] An authorization model for object-oriented databases and its efficient access control
    Morita, T
    Ishihara, Y
    Seki, H
    Ito, M
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 1998, E81D (06): : 521 - 531
  • [24] Role-based access control
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [25] A role-based access control model for information mediation
    Yang, L
    Ege, RK
    Ezenwoye, O
    Kharma, Q
    PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 277 - 282
  • [26] Role-based access control model for CSCW systems
    Li, Chengkai
    Zhan, Yongzhao
    Mao, Bing
    Xie, Li
    Ruan Jian Xue Bao/Journal of Software, 2000, 11 (07): : 931 - 937
  • [27] Attributes Enhanced Role-Based Access Control Model
    Rajpoot, Qasim Mahmood
    Jensen, Christian Damsgaard
    Krishnan, Ram
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 3 - 17
  • [28] The Research for Spatial Role-Based Access Control Model
    Zou, Zhiwen
    Chen, Changqian
    Ju, Shiguang
    Chen, Jiming
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 4, PROCEEDINGS, 2010, 6019 : 296 - 308
  • [29] A formal model for role-based access control with constraints
    Giuri, L
    Iglio, P
    9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 136 - 145
  • [30] A formal model for parameterized role-based access control
    Abdallah, AE
    Khayat, EJ
    FORMAL ASPECTS IN SECURITY AND TRUST, 2005, 173 : 233 - 246