DocumentCode :
2077270
Title :
Research on improved RBAC model and its access control strategy
Author :
Shi, Lei ; Sun, Shouqian ; Yuan, Jun
Author_Institution :
Comput. Sci. Tech. Dept., Zhejiang Univ., Hangzhou, China
fYear :
2008
fDate :
22-25 Nov. 2008
Firstpage :
1067
Lastpage :
1071
Abstract :
Role based access control (RBAC) is a technology that is attracting increasing attention, particularly for commercial application, because of its potential for reducing the complexity and cost of security administration in large networked application. Nevertheless, there are many deficiencies in the management of user, role and permission, as using the RBAC model in true applications. For instance, when the system gradually expand the scale, the assignment of the user and the assignment of the role¿s efficiency is rapidly decrease; the permission¿s transfer caused by the inheritance of the role, makes the contradictions between the number of role and the granularity of the permission be sharp gradually. In the light of the deficiency of traditional RBAC model¿s access control mechanism, four improved mechanisms are proposed and the improved model¿s access control policy is discussed.
Keywords :
authorisation; RBAC model; role based access control; security administration; Access control; Authorization; Costs; Data security; Information security; Internet; NIST; Permission; Protection; Sun; RBAC; access control; information security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer-Aided Industrial Design and Conceptual Design, 2008. CAID/CD 2008. 9th International Conference on
Conference_Location :
Kunming
Print_ISBN :
978-1-4244-3290-5
Electronic_ISBN :
978-1-4244-3291-2
Type :
conf
DOI :
10.1109/CAIDCD.2008.4730747
Filename :
4730747
Link To Document :
بازگشت