Research on an Access Control Model for Radio and Television Monitoring Software Based on T-RBAC

Article Preview

Abstract:

With the rapid development of radio and television industry, the use of software to improve the security of broadcasting and TV system by monitoring the radio and television equipment is becoming widely adopted, So how to improve the authorization management model of software to meet the need of detailed sub-division of authority and dynamic authorization becomes the focus of the industry and has practical significance. This paper first introduces the design concept, module composition of the radio and television integrated monitoring and management system (RTIMMS). In the second place, this paper reviews advantages and disadvantages of the most frequently used models including Role-Based Access Control (RBAC) and Task Based Access Control (TBAC). By researching and comparing two models above, the paper presents a mixed model called (T-RBAC) and divides tasks in two categories and related events respectively. The process of authority management is based upon the tasks, rules in rule base and usage count of permission. The diagram of T-RBAC authorization model is also introduced in the end.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1531-1535

Citation:

Online since:

January 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Information on http: /www. newpointtech. com/pdf/compass. pdf.

Google Scholar

[2] Qiang Kai, The Design and Implementation of the Radio and Television Integrated Monitoring System in NGB, The Ninth Conference of Cable Television Technology in Beijing, Tianjin, and Chongqing (2009).

Google Scholar

[3] Min Yu, Weimin Zhang: The Research on Distributed Remote Device Monitoring System Computer Engineering and Applications [J] (2009) 45.

Google Scholar

[4] Jianjun Li: Radio and TV Integrated Monitoring and Management System in Shanxi Province China, Broadcasting and TV technologies [J] (2009) 36.

Google Scholar

[5] R. K. Thomas and R. S. Sandhu: Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management[C], In Proceedings of the 11th IFIP Working Conference on Database Security (Lake Tahoe, CA), Chapman & Hall, Ltd, London, UK, (1997).

DOI: 10.1007/978-0-387-35285-5_10

Google Scholar

[6] Xiaowei Wang, An Access Control Model for Cloud Computing Based on T-RBAC Model and Three-party Key Exchange Protocol (2012).

Google Scholar