A Policy Based Access Control Model of PDM System

Article Preview

Abstract:

In PDM system, there exist many users, such as employees, partners, and customers. To protect resource from illegal access, it is very important to enforce access control policy in PDM system. RBAC is widely used as an access control model in PDM system. But, it is difficult for RBAC to support complex access control policy. This paper proposed a simple, flexible way to express and enforce access control policy. To keep the integrity of system security and make the system administer work easier, we propose auto revocation triggered by time and access control policy in our model. At the end of this paper introduces a system architecture and auto revocation algorithm. We also give some examples to show how this model works in PDM system.

You might also be interested in these eBooks

Info:

Periodical:

Materials Science Forum (Volumes 626-627)

Pages:

735-740

Citation:

Online since:

August 2009

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2009 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] D.D. Lindeman, B. Moore: Annual Reliability and Maintainability Symposium 1994 proceedings ( IEEE Press, 1994).

Google Scholar

[2] B.S. Tong, J. M. Li.: The technology of product data management (PDM). (Tsinghua University Press, Springer Press, China 2000).

Google Scholar

[3] X.W. Xu, T. Liu: Robotics and Computer Integrated Manufacturing Vol. 16(4)(2003), p.315.

Google Scholar

[4] J.A. Kim, J.H. Kim and N. Park: Proc. 28th International Conference on Technology of Object-Oriented Languages and Systems (Melbourne, Australia, November 23-26, 1998).

Google Scholar

[5] J.W. Yin, G. Chen and J.X. Dong: Journal of Computer Aided Design & Computer Graphics Vol. 13(11)(2001), p.971(in Chinese).

Google Scholar

[6] H.H. Shen , P. Dewan: Proc. the ACM CSCW'92 Conference on Computer Supported Cooperative Work. (Toronto, Canada, November 4, 1992).

DOI: 10.1145/143457.143461

Google Scholar

[7] K. Beznosow: Engineering Access Control for Distributed Enterprise Applications (Ph. D, Florida International University, 2000).

Google Scholar

[8] D.F. Ferraiolo, R. Sandhu and S. Gavrila: ACM Trans on information and System Security Vol. 4(3)(2001), p.224.

Google Scholar

[9] W.L. Han, G. Chen, J.W. Yin and J.X. Dong: Journal of Computer Aided Design & Computer Graphics Vol. 14(4)(2002), p.333 (in Chinese).

Google Scholar