Paper Title:
An Extended Role-Based Access Control Model for CSCW Systems
  Abstract

Due to the increasing threat of network attacks, network and information security is an upmost concern for CSCW. Traditional Role-Based Access made focus on the typical roles divided according to organizational roles in CSCW. It is insufficient to have role permissions based on object types for collaborative environments. An extended role-based access control model is proposed in this article to expand role to construct the hierarchy of security domain for CSCW. The total CSCW system was called security domain. Subdomain roles inherit security domain roles. Atomic domain roles inherit subdomain roles under role constrains. All extended role and role constraint are partial ordering and are used to restrict the range of access control for all CSCW participants.

  Info
Periodical
Key Engineering Materials (Volumes 431-432)
Edited by
Yingxue Yao, Dunwen Zuo and Xipeng Xu
Pages
577-582
DOI
10.4028/www.scientific.net/KEM.431-432.577
Citation
B. Chen, "An Extended Role-Based Access Control Model for CSCW Systems", Key Engineering Materials, Vols. 431-432, pp. 577-582, 2010
Online since
March 2010
Authors
Keywords
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Wen Long
Abstract:Manufacturing Execution System (MES) links plan management and workshop control in an enterprise, which is an integrative management and...
1084
Authors: Jun Li, Qing Li, Jian Zhou
Abstract:Nowadays, the Evaluation Indicator Architecture (EIA) is needed to measure the development level of Industrial Automation Systems (IAS). This...
466
Authors: Lei Cao, Hui Jun Deng, Yi Xu
Chapter 6: Other Related Topics
Abstract:Product lifecycle management (PLM) is a valuable concept for the implementation of advanced manufacturing method. Based on the principle of...
707
Authors: Xiao Li Meng, Feng He, Li Li Sun
Chapter 3: Modeling and Simulation
Abstract:Nowadays, business process has the problem of no unified standard, the lack of machine-understandable semantics and so on. Thus, in order to...
899
Authors: Bao Yi Wang, Wen Xue Zhang, Shao Min Zhang
Chapter 6: Information Technologies, WEB and Networks Engineering, Information Security, Software Application and Development
Abstract:A combination of Task and Role-based Access Control with multi-constraint is put forward in this paper. It is designed to solve problem of...
2532