The Experts below are selected from a list of 2080629 Experts worldwide ranked by ideXlab platform
Pla Information - One of the best experts on this subject based on the ideXlab platform.
-
Survey of Web Services Access Control Model
Computer Science, 2008Co-Authors: Yan Xue-xiong, Pla InformationAbstract:This paper analyzes new challenges,which include access Control across multiple security domains,dynamic authorization and standards,for Web Services access Control.The paper classifies access Control Model according to what the Model depends to making decision,and then introduces the principles of these Models.After analyzing the a- bility to solve the new challenges,this paper discusses the research directions for Web Services access Control Model.
-
Application of Usage Control Model in DRM
2007Co-Authors: Pla InformationAbstract:Usage Control Model is a new access Control Model proposed nearly, it defines the framework of modern access Control mod-el systematically and semantically.In this paper the usage Control Model is introduced and analyzed at first,then used to implements the DRM policy,and finally two application examples are proposed.
-
One Role &Task-Based Access Control Model
Microcomputer Information, 2007Co-Authors: Pla InformationAbstract:Introduce the concept of task and task instance into role-based access Control Model,build the role task-based ac-cess Control Model,propose its formal definition.The security of the Model is analyzed,the result show that role task-based ac-cess Control Model supports two security principles such as least privilege and separation of duty,and has good dynamic adoption.
Seog Park - One of the best experts on this subject based on the ideXlab platform.
-
task role based access Control Model
Information Systems, 2003Co-Authors: Sejong Oh, Seog ParkAbstract:There are many information objects and users in a large company. It is an important issue how to Control user's access in order that only authorized user can access information objects. Traditional access Control Models-- discretionary access Control, mandatory access Control, and role-based access Control--do not properly reflect the characteristics of enterprise environment. This paper proposes an improved access Control Model for enterprise environment. The characteristics of access Control in an enterprise environment are examined and a task-role-based access Control (T-RBAC) Model founded on concept of classification of tasks is introduced. Task is a fundamental unit of business work or business activity. T-RBAC deals with each task differently according to its class, and supports task level access Control and supervision role hierarchy. T-RBAC is a suitable access Control Model for industrial companies.
Hong Fan - One of the best experts on this subject based on the ideXlab platform.
-
Access Control Model Based on Enterprise Environment
Computer Engineering, 2005Co-Authors: Hong FanAbstract:Access Control is an important measure to secure the information system in the enterprise, but the existing access Control Models, suchas DAC, MAC, RBAC and TBAC, can’t fully meet the requirements of the enterprise environment, therefore this paper introduces a new accessControl Model for enterprise environment, called task-role-based access Control Model (T-RBAC). In the end, an implementation framework is givenaccording to T-RBAC.
-
Perti Net-Based Workflow Access Control Model
Journal of Shanghai University (English Edition), 2004Co-Authors: Chen Zhuo, Luo Ting, Shi Lei, Hong FanAbstract:Access Control is an important protection mechanism for information systems. This paper shows how to make access Control in workflow system. We give a workflow access Control Model (WACM) based on several current access Control Models. The Model supports roles assignment and dynamic authorization. The paper defines the workflow using Petri net. It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access Control Model (WACM). Finally, an example of an e-commerce workflow access Control Model is discussed in detail.
Sejong Oh - One of the best experts on this subject based on the ideXlab platform.
-
task role based access Control Model
Information Systems, 2003Co-Authors: Sejong Oh, Seog ParkAbstract:There are many information objects and users in a large company. It is an important issue how to Control user's access in order that only authorized user can access information objects. Traditional access Control Models-- discretionary access Control, mandatory access Control, and role-based access Control--do not properly reflect the characteristics of enterprise environment. This paper proposes an improved access Control Model for enterprise environment. The characteristics of access Control in an enterprise environment are examined and a task-role-based access Control (T-RBAC) Model founded on concept of classification of tasks is introduced. Task is a fundamental unit of business work or business activity. T-RBAC deals with each task differently according to its class, and supports task level access Control and supervision role hierarchy. T-RBAC is a suitable access Control Model for industrial companies.
Liu Rui - One of the best experts on this subject based on the ideXlab platform.
-
A New Role-based Access Control Model
Computer Engineering, 2006Co-Authors: Liu RuiAbstract:This paper analyzes the drawback of role-based access Control Model that is onerous secure maintenance costs in the systems which have a large amount of highly updating frequently information.Based on this point,a new role-based access Control Model―-ARBAC has been proposed.This new Model has lower secure maintenance costs,well secure Control effects,and can effectively overcome the drawback of role-based access Control Model in the kind of the systems mentioned above.