Control Model

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 2080629 Experts worldwide ranked by ideXlab platform

Pla Information - One of the best experts on this subject based on the ideXlab platform.

  • Survey of Web Services Access Control Model
    Computer Science, 2008
    Co-Authors: Yan Xue-xiong, Pla Information
    Abstract:

    This paper analyzes new challenges,which include access Control across multiple security domains,dynamic authorization and standards,for Web Services access Control.The paper classifies access Control Model according to what the Model depends to making decision,and then introduces the principles of these Models.After analyzing the a- bility to solve the new challenges,this paper discusses the research directions for Web Services access Control Model.

  • Application of Usage Control Model in DRM
    2007
    Co-Authors: Pla Information
    Abstract:

    Usage Control Model is a new access Control Model proposed nearly, it defines the framework of modern access Control mod-el systematically and semantically.In this paper the usage Control Model is introduced and analyzed at first,then used to implements the DRM policy,and finally two application examples are proposed.

  • One Role &Task-Based Access Control Model
    Microcomputer Information, 2007
    Co-Authors: Pla Information
    Abstract:

    Introduce the concept of task and task instance into role-based access Control Model,build the role task-based ac-cess Control Model,propose its formal definition.The security of the Model is analyzed,the result show that role task-based ac-cess Control Model supports two security principles such as least privilege and separation of duty,and has good dynamic adoption.

Seog Park - One of the best experts on this subject based on the ideXlab platform.

  • task role based access Control Model
    Information Systems, 2003
    Co-Authors: Sejong Oh, Seog Park
    Abstract:

    There are many information objects and users in a large company. It is an important issue how to Control user's access in order that only authorized user can access information objects. Traditional access Control Models-- discretionary access Control, mandatory access Control, and role-based access Control--do not properly reflect the characteristics of enterprise environment. This paper proposes an improved access Control Model for enterprise environment. The characteristics of access Control in an enterprise environment are examined and a task-role-based access Control (T-RBAC) Model founded on concept of classification of tasks is introduced. Task is a fundamental unit of business work or business activity. T-RBAC deals with each task differently according to its class, and supports task level access Control and supervision role hierarchy. T-RBAC is a suitable access Control Model for industrial companies.

Hong Fan - One of the best experts on this subject based on the ideXlab platform.

  • Access Control Model Based on Enterprise Environment
    Computer Engineering, 2005
    Co-Authors: Hong Fan
    Abstract:

    Access Control is an important measure to secure the information system in the enterprise, but the existing access Control Models, suchas DAC, MAC, RBAC and TBAC, can’t fully meet the requirements of the enterprise environment, therefore this paper introduces a new accessControl Model for enterprise environment, called task-role-based access Control Model (T-RBAC). In the end, an implementation framework is givenaccording to T-RBAC.

  • Perti Net-Based Workflow Access Control Model
    Journal of Shanghai University (English Edition), 2004
    Co-Authors: Chen Zhuo, Luo Ting, Shi Lei, Hong Fan
    Abstract:

    Access Control is an important protection mechanism for information systems. This paper shows how to make access Control in workflow system. We give a workflow access Control Model (WACM) based on several current access Control Models. The Model supports roles assignment and dynamic authorization. The paper defines the workflow using Petri net. It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access Control Model (WACM). Finally, an example of an e-commerce workflow access Control Model is discussed in detail.

Sejong Oh - One of the best experts on this subject based on the ideXlab platform.

  • task role based access Control Model
    Information Systems, 2003
    Co-Authors: Sejong Oh, Seog Park
    Abstract:

    There are many information objects and users in a large company. It is an important issue how to Control user's access in order that only authorized user can access information objects. Traditional access Control Models-- discretionary access Control, mandatory access Control, and role-based access Control--do not properly reflect the characteristics of enterprise environment. This paper proposes an improved access Control Model for enterprise environment. The characteristics of access Control in an enterprise environment are examined and a task-role-based access Control (T-RBAC) Model founded on concept of classification of tasks is introduced. Task is a fundamental unit of business work or business activity. T-RBAC deals with each task differently according to its class, and supports task level access Control and supervision role hierarchy. T-RBAC is a suitable access Control Model for industrial companies.

Liu Rui - One of the best experts on this subject based on the ideXlab platform.