Role-Based Access Control Implementation Using Prime Numbers

被引:0
|
作者
Sahafizadeh, Ebrahim [1 ]
Sartoly, Sara [2 ]
Chamkoori, Alireza [3 ]
机构
[1] Payame Noor Univ, Dept Informat Technol, Boushehr, Iran
[2] Shahid Chamran Univ Ahwaz, Dept Comp Sci, Ahvaz, Iran
[3] Univ Appl Sci &Technol, Culture & Art Dept, Boushehr, Iran
关键词
access control; RBAC; prime numbers;
D O I
10.1109/ICCEE.2009.154
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Access control is a part of software systems which hasn't presented as an independent part of software development process. It is often used after Software development and applies access policies. In this paper we present an approach to implement Role-Based Access Control (RBAC) using prime numbers in programming languages. Security Policies are able to be applied on applications source code using this approach. A major goal of our implementation is to have elegant solution, minimal changes to the source code and can implement concurrent to software implementation phase.
引用
收藏
页码:234 / +
页数:2
相关论文
共 50 条
  • [1] The implementation of role-based access control on the web
    Xu, CG
    Yan, H
    Liu, FG
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : D251 - D255
  • [2] Role-based access control
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [3] Design and Implementation of Dynamic Menu Based on Role-Based Access Control
    Chen, Ying
    Yang, Fengyu
    MATERIALS PROCESSING AND MANUFACTURING III, PTS 1-4, 2013, 753-755 : 2990 - 2994
  • [4] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [5] Role-based access control on the web using LDAP
    Park, JS
    Ahn, GJ
    Sandhu, R
    DATABASE AND APPLICATION SECURITY XV, 2002, 87 : 19 - 30
  • [6] Role-based access control using neural network
    Chae, SH
    Kim, W
    Kim, DK
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 36 - 40
  • [7] An application using role-based access control model
    Wang, G
    Cong, B
    Chen, N
    Lan, M
    Yan, HT
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, 2000, : 369 - 375
  • [8] Using NFS to implement role-based access control
    Gustafsson, M
    Deligny, B
    Shahmehri, N
    SIXTH IEEE WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 1997, : 299 - 304
  • [9] Role-Based Access Control and the Access Control Matrix
    Saunders, G.
    Hitchens, M.
    Varadharajan, V.
    2001, Association for Computing Machinery (35):
  • [10] Research and Implementation of Role-based Access Control Model Based on Partition Number
    Chen Jinyu
    Tong, Zhang
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 2, PROCEEDINGS, 2009, : 6 - 9