The Realization Strategy of RBAC Enterprise Office Automation System

Article Preview

Abstract:

Internet MIS security technology includes mainly: Authentication, Encryption, Access Control, Auditing and so on. Role-based access control (RBAC) is an access control method that has been widely used in Internet, operation system and relation database many years. Though RBAC is already relatively mature in the above fields, new problems occur when it is used in XML properties. By means of enterprise office automation system (EOA), the enterprise can easily migrate the release of information and communication functions to the Internet, which makes people convenience. The EOA system also provided a combination of enterprise management process reengineering, construction and optimization of the internal management information systems, decision support systems, and office automation systems. The system can get high level technical and advisory support for the management of enterprise information to fulfill the needs of specific business, affairs, and the conferences. This paper introduces EOA system strategy based on role-based access control (RBAC). The system centers in day-to-day office management service, achieves division of authority between different departments and staff through the introduction of data rights and function rights, so as to achieve the office management platform with the coordination of information, management, and service. This paper provides the method of realizing the work flow through RBAC management, the concept of authority is broken down to each operating procedures; realization of user operational procedures are reflected in the achievement of right-matching and right-series, office processes are standardized, the management level and quality are improved; the goal of improving office efficiency is achieved.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2206-2211

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Lupu, E. C., and M. S. Sloman (1997a). Reconciling Role Based Management and Role Based Access Control. In (RBAC' 1997)[R], Win Treese, XML, web services, and XMIL. September 2002, Volume 6,Issue 3, 135-142.

DOI: 10.1145/266741.266770

Google Scholar

[2] Paul Jackson, Noah Curthoys. E-government: Developments in the US and UK. The 12th International Workshop on Database and Expert Systems Applications, Munich Germany, September, 2001, 03-07.

DOI: 10.1109/dexa.2001.953084

Google Scholar

[3] Michael Mahemoff, Lnaine J. Johnston, Handling Multiple Domain Objects with Model-View-Controller. 32nd International Conference on Technology of Object Oriented Languages. Melbourne, Austrian, November, 1999. 22-25.

DOI: 10.1109/tools.1999.809412

Google Scholar

[4] Michael Mattson, Jan Bosch, Mohamed E. Fayad. Framework Integration, problems, causes, solution. Fifth IEEE International Enterprise Distributed Object Computing Conference. Seattle, Washington September, 2001. 04-07.

Google Scholar

[5] Indrakshi Ray, Na Li, Robert France, et al. Using UML to visualize role-based access control constraints . Proceedings of the ninth ACM symposium on Access control models and technologies . Yorktown Heights, New York, USA, June (2004).

DOI: 10.1145/990036.990054

Google Scholar

[6] Antanio Rito Silva, Francisco Assis Rosa, Teresa. Framework description using concern-specific design patterns composition. ACM Computing Surveys (CSUR), 32(1): 16-16.

DOI: 10.1145/351936.351952

Google Scholar

[7] Sihem Amer-Yahia, Divesh Srivastava . A schema and interface for avail stores. Proceedings of the 4th international workshop on Web information and data management. McLean, Virginia, USA, November (2002).

DOI: 10.1145/584931.584937

Google Scholar

[8] Role based access Control(RBAC) and role based security, http: /csrc. nist. gov/groups/SNS/rbac.

Google Scholar