An extensible role based access control management system

Author(s):  
Zhen-wu Wang
2015 ◽  
Vol 713-715 ◽  
pp. 2532-2535
Author(s):  
Bao Yi Wang ◽  
Wen Xue Zhang ◽  
Shao Min Zhang

A combination of Task and Role-based Access Control with multi-constraint is put forward in this paper. It is designed to solve problem of access control management about collaborators in workflow system, whose difficulties lie in complex authorization and low users efficiency. It combines the tasks and roles, classifies tasks, simplifies permissions management, defines the mutually exclusive roles and binding tasks and formulates dynamic users allocation policies by establishing a users execution history table to improving the efficiency. Finally, a specific dynamic access control design is given for electric power enterprise equipment maintenance management workflow, the given example shows that the model and algorithm satisfies the principle of least permission and separation of duties and ensures the workflow system to execute tasks safely and efficiently.


Author(s):  
Nazia Badar ◽  
Jaideep Vaidya ◽  
Vijayalakshmi Atluri ◽  
Nino Vincenzo Verde ◽  
Janice Warner

2012 ◽  
Vol 463-464 ◽  
pp. 1630-1633
Author(s):  
Hai Yun Lin ◽  
Yu Jiao Wang ◽  
Jian Bi

Along with the increasing number of Chinese automobiles in cities, the vehicle management becomes a difficult issue. The effective management on vehicle is to identify the vehicle. RFID technology can be used for the access control management, which can serve an effective way to identify the vehicles, making access control management of the security protection more effective and intellective[1] . Access Control System based on RFID protocol is proposed, and then introduces a model of system and gives a brief description of each component of the model, A detailed explanation about the implementation of each model is given.


2012 ◽  
Vol 241-244 ◽  
pp. 3125-3129 ◽  
Author(s):  
Jin Li

For analyzing the multilayer structure of the J2EE, based on Role-Based Access Control, a model of privilege management infrastructure was designed. It was implemented after the discussion of the existing privilege management system. Moreover, the safe authority control was realized with good effect.


Sign in / Sign up

Export Citation Format

Share Document