Research of Access Control Models in Personal Networks

Article Preview

Abstract:

How to prevent illegal users from sharing system resources was one of the main purposes for MAGNET Security Group. This paper introduced some major access control models such as traditional access control models, role-based access control model (RBAC), task-based access control model (TBAC) and role-task-based access control model (T-RBAC). In the end, a feasible scheme PN_T-RBAC was proposed at the base of the T-RBAC model in existence, which was suitable for the coalition environment of personal networks.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

4751-4754

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] H. B. Shen and F. Hong, Review of access control model, Application Research of Computers, Vol. 17(2007), p.9.

Google Scholar

[2] R. F. Han and H.X. Wang, Research of task-role-based access control modl , Computer Engineering and Design, Vol. 12(2007), p.800.

Google Scholar

[3] F. Z. Chen and F. Hong, Task-based access control (TBAC) Model, Mini-micro Systems, Vol. 24(2008), p.621.

Google Scholar

[4] Sejong Oh and Myong Park, Tasked-role-based Access Control Model, Information System, Vol. 28(2008), p.533.

Google Scholar

[5] S. S. Chen, The time frame of dynamic trust model based on DyTrust: for P2P system, science and techonoly information, vol. 35(2011), p.123.

Google Scholar