Role-Based Access Control Implementation Using Prime Numbers

被引:0
|
作者
Sahafizadeh, Ebrahim [1 ]
Sartoly, Sara [2 ]
Chamkoori, Alireza [3 ]
机构
[1] Payame Noor Univ, Dept Informat Technol, Boushehr, Iran
[2] Shahid Chamran Univ Ahwaz, Dept Comp Sci, Ahvaz, Iran
[3] Univ Appl Sci &Technol, Culture & Art Dept, Boushehr, Iran
关键词
access control; RBAC; prime numbers;
D O I
10.1109/ICCEE.2009.154
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Access control is a part of software systems which hasn't presented as an independent part of software development process. It is often used after Software development and applies access policies. In this paper we present an approach to implement Role-Based Access Control (RBAC) using prime numbers in programming languages. Security Policies are able to be applied on applications source code using this approach. A major goal of our implementation is to have elegant solution, minimal changes to the source code and can implement concurrent to software implementation phase.
引用
收藏
页码:234 / +
页数:2
相关论文
共 50 条
  • [21] Study of Role-based Access Control
    Cao Yonghui
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5209 - 5212
  • [22] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
  • [23] RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control
    Wang, Man
    Mayo, Jean
    Shene, Ching-Kuang
    Lake, Thomas
    Carr, Steve
    Wang, Chaoli
    ITICSE'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, 2015, : 141 - 146
  • [24] Role-based access control on the web using Java']Java™
    Giuri, L
    FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 11 - 18
  • [25] Role-based Access Control Using Ontology in Cloud Storage
    Sun, Hong
    Zhang, Xueqin
    Gu, Chunhua
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 1 - 12
  • [26] Access Control in XML Repositories Using a Role-Based Approach
    Chen, Shihn-Yuarn
    Ke, Hao-Ren
    Tsai, Wen-Nung
    Yang, Wei-Pang
    JOURNAL OF INTERNET TECHNOLOGY, 2010, 11 (07): : 1041 - 1056
  • [27] Using attribute certificate to design role-based access control
    Wang, CJ
    Wu, JP
    Duan, HX
    PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT'2003, PROCEEDINGS, 2003, : 216 - 218
  • [28] The Implementation of Rights Management of Network Teaching Platform with Role-Based Access Control
    Han, Guiying
    Li, Xizuo
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1603 - +
  • [29] An attributable role-based access control for healthcare
    Schwartmann, D
    COMPUTATIONAL SCIENCE - ICCS 2004, PROCEEDINGS, 2004, 3039 : 1148 - 1155
  • [30] Homonymous role in role-based discretionary access control
    Chu, Xiaowen
    Kai Ouyang
    Chen, Hsiao-Hwa
    Liu, Jiangchuan
    Jiang, Yixin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2009, 9 (09): : 1287 - 1300