An Expanded Model of Role-Based Access Model Based on Resource Model

被引:0
|
作者
Liang, Zhi-hong [1 ]
Sun, Xing-ping [1 ]
Chen, Qing-yi [1 ]
Hu, Jun-hua [2 ]
Sun, Shu-qiong [2 ]
机构
[1] Yunnan Univ, Sch Software, Kunming 650091, Yunnan, Peoples R China
[2] Key Lab Software Engn Yunnan Prov Republ China, Kunming 650091, Yunnan, Peoples R China
关键词
RBAC; Accessing control; Resource model;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the RBAC model, a resource is represented by an object. As there is close connectivity between objects and operation, the resources accessing control authorization is inconvenient. This paper extends the RBAC object model to the resource model while the resource elements, abstract resources and resource bundles are defined in the resource model. The RBAC operating model is extended and the concept of abstract operations and the operating bundles are proposed. In addition, the relationship between resources and operations are discussed and the grading of the resource and role is proposed.
引用
收藏
页码:1044 / 1053
页数:10
相关论文
共 50 条
  • [31] Role hierarchy model for role-based access control and its application
    Zhong, Hua
    Feng, Yulin
    Jiang, Hongan
    2000, (11):
  • [32] Role-based access control model for ubiquitous computing environment
    Chae, SH
    Kim, W
    Kim, DK
    INFORMATION SECURITY APPLICATIONS, 2006, 3786 : 354 - 363
  • [33] Towards Trustworthy Delegation in Role-Based Access Control Model
    Toahchoodee, Manachai
    Xie, Xing
    Ray, Indrakshi
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 379 - 394
  • [34] A spatio-temporal role-based access control model
    Ray, Indrakshi
    Toahchoodee, Manachai
    DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 211 - +
  • [35] A Novel Role-based Access Control Model in Cloud Environments
    Luo, Jun
    Wang, Hongjun
    Gong, Xun
    Li, Tianrui
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2016, 9 (01) : 1 - 9
  • [36] Applications of the oriented permission role-based access control model
    Chen, Liang
    Crampton, Jason
    2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2007, : 387 - +
  • [37] An approach to enforcing Clark-Wilson model in role-based access control model
    Liang, B
    Shi, WC
    Sun, YF
    Sun, B
    CHINESE JOURNAL OF ELECTRONICS, 2004, 13 (04): : 596 - 599
  • [38] Preventing Illegal Information Flow Based on Role-Based Access Control Model
    Enokido, Toaloya
    Takizawa, Makoto
    NETWORK-BASED INFORMATION SYSTEMS, PROCEEDINGS, 2008, 5186 : 242 - +
  • [39] Research and Implementation of Role-based Access Control Model Based on Partition Number
    Chen Jinyu
    Tong, Zhang
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 2, PROCEEDINGS, 2009, : 6 - 9
  • [40] Role-based Runtime Model Synchronization
    Werner, Christopher
    Schoen, Hendrik
    Kuehn, Thomas
    Goetz, Sebastian
    Assmann, Uwe
    44TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2018), 2018, : 306 - 313