The Design and Implementation of G-RBAC Model in Map Permission

Article Preview

Abstract:

With the development of WebGIS, it plays a more and more important role in government and enterprises. The effective way to access and control spatial data, because of relating to the security and business secrets of government and enterprises, becomes an urgent concern for them. Now, RBAC (Role Based Access Control) can be a valid method to access and control uniform resource, but it is lack of flexibility and real-time ability to control spatial data in WebGIS. For that, this paper proposes G-RBAC model based on RBAC model to enhance the flexibility and real-time ability to access spatial data.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 268-270)

Pages:

1457-1461

Citation:

Online since:

July 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] David F. Ferraiolo and D. Richard Kuhn, Role-Based Access Controls[C], Proceedings of the 15th NIST-NSA National Computer Security Conference, Baltimore, Maryland, October 13-16, (1992).

Google Scholar

[2] Lin Youshun, Zhong Sheng. The Desgin and realization of System based on RBAC [J]. The Application of Comptuer, 2009, 3: 59-60.

Google Scholar

[3] Li Jing, Li Xiaolin, Zhu Sisi. The Design of multi-level permission control based on RBAC permission [J]. Software Guide, 2009, 8, 4: 140-142.

Google Scholar

[4] Hu Tengbo, Ye Jiankao. RBAC for the extended model of WebGIS [J]. Computer Applications and Software, 2009, 26, 6: 185-187.

Google Scholar

[5] Ferraiolo, D.F., Kuhn, D.R., and Sandhu. The NIST Model for Role-Based Access Control: Toward a Unified Standard [C]. 5th ACM Workshop Role-Based Access Control. 2000, 7: 47–63.

DOI: 10.1145/344287.344301

Google Scholar

[6] Wu Lun, Liu Yu., Zhang Jin etc. GIS's Principles Methods and Applications [C]. Science Publication. 2002, 3: 155–159.

Google Scholar