Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Beijing University of Aeronautics and Astronautics》 2005-03
Add to Favorite Get Latest Update

Extended role-based access control model

Xue Wei Huai Jinpeng(School of Computer Science and Technology, Beijing University of Aeronautics and Astronautics, Beijing 100083, China)  
An extended RBAC(role based access control) model, RTBAC (role task based access control) model was presented. The model introduced the notions of task and task instance into RBAC96 model, formally defined the hierarchies of tasks and task instances, specified the relationships between traditional sessions and task instances as well as the relationships between task instances and permissions. Several assistant functions were defined. The model could be used to depict daily business procedures and related access control policies more naturally, so was more suitable for distributed collaborative applications, especially for workflows and service compositions. Based on this model, a new dynamic separation of duty constraint, namely task-based dynamic separation of duty constraint, was formally defined and compared with traditional dynamic separation of duty constraints using a typical example. The new constraint can specify access control related system runtime context more accurately. It can increase the efficiency of access control at runtime.
【Fund】: 国家 8 6 3计划基金资助项目 (2 0 0 2AA1 1 30 30 ;2 0 0 3AA1 44 1 5 0 );; 国家自然科学基金资助项目 (90 41 2 0 1 1 )
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 2 Hits
1 DENG Hong-xia,DUAN Fu;Design of the Access Control Model for Teaching Quality Supervisory System[J];Sci-Tech Information Development & Economy;2007-31
2 HOU Si-zu1,ZHANG Jing-min1,LU Xu2,TIAN Xin-cheng1(1.College of Electrical and Electronic Engineering,North China Electric Power University,Baoding 071003,China;2.Panjin City of Liaoning Province Power Supply Company,Panjin 124010,China);Research of TRBAC model and its application in enterprise MIS[J];Computer Engineering and Design;2008-12
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 JIN Ding1,WANG Jing-nong2,ZHANG Xin-yun2,SUN Bao-dian2(1.Department of Research and Development,CNPC,Beijing 100724,China;2.Technology Center,China Petroleum Logging CO.LTD.,Xi′an,Shaanxi 710021,China);Situation and Direction of CNPC Well Logging Technologies Development[J];Well Logging Technology;2007-02
2 CHEN Jun~1,WU Tian-yu~2,ZNEG Zhi-hao~2,CHEN Zhi-ping~2 (1.Guiding Center for Admission and Employment,Hunan University, Changsha 410082,China 2.College of Computer and Communication, Hunan University, Changsha 410082,China);Management with Extended Authority Based on Authority Conflict[J];Journal of Changsha University of Electric Power(Natural Science);2005-01
3 Wang Jianming(North China Electric Power University);Data Security Design of Power System Based on Improved RBAC Model[J];Electrotechnical Application;2006-09
4 WANG Xing-wei~1,WANG Yu~2(1.CERNET Northeastern Networking Center,Northeastern University,Shenyang 110004,China;2.Networking Center,Northeastern University,Shenyang 110004,China);Design and implementation of access control management based on RBAC of Web MIS[J];Journal of Dalian University of Technology;2005-S1
5 ZUO li-ming,SHENG mei-bo,MA Juan,LIU er-geng (1 School of Natural Science, East China Jiaotong Uni., Nanchang 330013;2 School of Management, Wuhan University of Science and Technology, Wuhan 430081);Sensitive Information Encryption of Network Database Base on JCE[J];Journal of East China Jiaotong University;2004-04
6 XUEMei, SUN Shu-feng, GU Jun-zhong (Departement of Computer Science , East China Normal University, Shanghai 200062, China);Research on A Content-based Secure Architecture Model[J];Journal of East China Normal University(Natural Science);2006-01
7 RAN Chun-yu,LI Yan,ZHONG Ming,ZHANG Hao(Computer College,Wuhan University of Science and Technology,Wuhan 430070,China);Research on J2EE security mechanism in the intelligent building OA system and its application[J];Information Technology;2006-07
8 ;Thinking About Informatization of Manufacturing Industry in China[J];Aeronautical Manufacturing Technology;2003-08
9 Lei Jun(Dept.of Electrical Engineering,Hubei Automotive Industries Institute,Shiyan 442002,China);Research on Implementation of RBAC Security Policies[J];Journal of Hubei Automotive Industries Institute;2006-03
10 Wen Yuanbao Yi Bin;A New Method for the Development of Enterprise Information System[J];JOURNAL OF HUAZHONG UNIVERSITY OF SCIENCE AND TECHNOLOGY;2000-04
【Secondary References】
Chinese Journal Full-text Database 3 Hits
1 SHEN Chunling,SHEN Dongling,TONG Xiangyan;Application of Task-based Authorization Controls Model in Nursing Management in Internal Medicine[J];Journal of Nursing Science;2009-05
2 Hu Jingpo Li Menlou(Department of Computer,China University of Geosciences,Wuhan 430074);Design and Implementation of the Dissertation Evaluation of the Information Platform Based on Web[J];Computer & Digital Engineering;2009-04
3 ZHANG Xian-yong,LI Yong,ZHANG Hao(College of Information,Wuyi University,Jiangmen 529020,China);Research and Realization of Role-based Access Control in B/S Model of Information Management System[J];Computer and Modernization;2010-05
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved