An Improved RBAC Model and its Application in Development of Information System

Article Preview

Abstract:

Aiming at the deficiencies of traditional RBAC model, on the basis of studying of the models introduced in the literatures published, this paper puts forwards an improved model--MR-RBAC, including its concepts and design. This model is implemented by adding restriction strategy on the operation objects and data objects, assignment different privileges to different users via configuration mapping of functions and menus. The implementation and practice indicates that the MR-RBAC model not only simplifies privilege management, but also improves the system security and privileges management flexibility.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

4650-4653

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Ferraiolo, David, Janet Cugini, and D. Richard Kuhn. Role-based access control (RBAC): Features and motivations. Proceedings of 11th Annual Computer Security Application Conference. (1995), pp.241-48.

Google Scholar

[2] Sandhu, Ravi S., et al. Role-Based Access Control Models. IEEE computer 29. 2 (1996), pp.38-47.

Google Scholar

[3] Ferraiolo, D. F., Sandhu, R., Gavrila, S., Kuhn, D. R., & Chandramouli, R. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security (TISSEC) 4. 3 (2001), pp.224-274.

DOI: 10.1145/501978.501980

Google Scholar

[4] S. P. FAN, Y. GAO. Extended RBAC rights management model based on three management roles separation and data constraints. Journal of Computer Applications. 31(S2), (2011), pp.112-115.

Google Scholar

[5] W. G. LI, F. Y. ZHAO. RABC Permission Access control Model with Attribute Policy. Journal of Chinese Computer Systems. 34(2), (2013), pp.328-331.

Google Scholar

[6] Y. WANG, M. WANG, M. LI. Research on Configuration of Custom UI in MIS. Science and Technology Management Research. 32(17), (2012), pp.220-224.

Google Scholar