Research and Implemention of File Protection System Based on Improved Role-Based Access Control

被引:1
|
作者
Ke, Gang [1 ]
Ling, Jie [1 ]
Hao, Yanjun [1 ]
Liao, Hongqi [1 ]
Yang, Zhaoxia [2 ]
机构
[1] Guangdong Univ Technol, Fac Comp, Guangzhou, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Fac Math & Computat Sci, Guangzhou, Guangdong, Peoples R China
关键词
RBAC; user groups; authorization; object roles;
D O I
10.1109/ISCID.2009.207
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper analyses the requirements of file protection. It proposes an improved role-based access control model, which is based on the analysis of shortcomings of traditional RBAC model. This model improves the traditional RBAC model, and importes the concept of user group and object role, also presentes the principal authorized the users and the roles. Finally produces the formal definition of the improved RBAC model, and designes a file protection system based on this model,which realizes fine grain access control to file,and also has advantages of flexible authorization,strong safety, simple maintenance,etc.
引用
收藏
页码:242 / +
页数:2
相关论文
共 50 条
  • [1] Research and realization of the role-based system access control management
    Cai, Hong
    Chen, Rong-Yao
    Ling, Hu-Jia
    Journal of Donghua University (English Edition), 2010, 27 (02) : 267 - 269
  • [2] Research and Realization of the Role-Based System Access Control Management
    蔡红
    陈荣耀
    令狐佳
    JournalofDonghuaUniversity(EnglishEdition), 2010, 27 (02) : 267 - 269
  • [3] An improved Role-based workflow Access Control Model
    Zhao, Hui
    Fang, Zhiyi
    Xu, Peng
    Zhao, Lianyu
    Liu, Jin
    Wang, Tianyang
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 551 - 556
  • [4] The research on role-based access control mechanism for workflow management system
    Wang, BY
    Zhang, SM
    GRID AND COOPERATIVE COMPUTING GCC 2004, PROCEEDINGS, 2004, 3251 : 729 - 736
  • [5] FRAC: Implementing role-based access control for network file systems
    Bohra, Aniruddha
    Smaldone, Stephen
    Iftode, Liviu
    SIXTH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2007, : 95 - +
  • [6] A Search Engine System Based On Role-Based Access Control
    Cheng, Ning
    Zhao, Li
    Ma, Xiaopu
    Lan, Yihua
    Chen, Yi
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES (ICCIS 2014), 2014, : 1128 - 1137
  • [7] Role-based access control
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [8] Application Research of the CAN on Role-based Access Control
    Qin, Shi-Hong
    Zhao, Qing
    Ge, Zhou
    Li, Huanhuan
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4668 - +
  • [9] The Research for Spatial Role-Based Access Control Model
    Zou, Zhiwen
    Chen, Changqian
    Ju, Shiguang
    Chen, Jiming
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 4, PROCEEDINGS, 2010, 6019 : 296 - 308
  • [10] Research and Application of an Extended Role-Based Access Control
    Zhao, Jingsheng
    Zhang, Wei
    Zhang, Peng
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2654 - 2656