Guo Honglei, Li Wei. Basic Operations in the Language Processing[J]. Journal of Beijing University of Aeronautics and Astronautics, 1998, 24(6): 726-729. (in Chinese)
Citation: Yao Quanying, Yao Shuzhen, Huang He, et al. Context aware and group based access control[J]. Journal of Beijing University of Aeronautics and Astronautics, 2011, 37(7): 901-906. (in Chinese)

Context aware and group based access control

  • Received Date: 08 Jul 2010
  • Publish Date: 30 Jul 2011
  • Role based access control(RBAC) mainly depend on role given by the theme to achieve the protection of natural resources. In the control of the permissions, execution context, how the customs organize and manage were not taken into account.In order to adapt dynamic requirements of the application environment and to make the management of customs more convienent, RGBACC model was put forward. RGBACC model add "context-aware"and "user group management" to RBAC model. The context information ralated security from application environment was obtained to dynamically change the user-s permission. To the customs who have the same function, RGBACC model can manage them unifiedly,at the same time,it maintain the advantagement of traditional RBAC model.

     

  • [1] Foster I,Kesselman C,Tuecke S.The anatomy of the grid:enabling scalable virtual organization[J].International Journal of Supercomputer Applications,2001,2150:200-222 [2] 姚寒冰,胡和平,李瑞轩.上下文感知的动态访问控制[J].计算机工程与科学,2007,29(5):1-3 Yao Hanbing,Hu Heping,Li Ruixuan.Dynamic access control on context-aware[J].Computer Engineering and Science,2007,29(5):1-3(in Chinese) [3] 叶小玲,吴敏.高效业务管理系统中权限模型的研究与实现[J].计算机工程与设计,2010,31(2):351-377 Ye Xiaoling,Wu Min.Research and implementation of permissions model in efficient business management system[J].Computer Engineering and Design,2010,31(2):371-377(in Chinese) [4] Weiser M.The computer for the 21th Century[J].Scientific American,2001,265(3):94-104 [5] 张沙沙,姜华,谢圣献,等.基于上下文感知的RBAC动态访问控制研究[J].计算机安全,2009(8):5-8 Zhang Shasha,Jiang Hua,Xie Shengxian,et al.Research of RBAC dynamic access control based on contexta ware[J].Computer Security,2009(8):5-8 [6] Gligor V D,Gavrila S I,Ferraiolo D F.On the formal definition of separation of duty policies and their composition //Computer Society .Washington D C:IEEE,2007:172-185 [7] 杨晓静.RBAC模式中互斥角色的性质及其安全性[J].计算机应用,2003,12(23):138-142 Yang Xiaojing.The nature and safety of Exclusive role in RBAC[J].Computer Application,2003,12(23):138-142
  • Relative Articles

    [1]YIN W Z,LIAN D P,LI K Y,et al. Manipulator force/position hybrid control based on staged adaptation[J]. Journal of Beijing University of Aeronautics and Astronautics,2025,51(1):161-166 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0955.
    [2]TANG J M,HUANG J Q,WANG B W,et al. Resource optimization of multi UAV assisted communication system based on user scheduling[J]. Journal of Beijing University of Aeronautics and Astronautics,2025,51(4):1143-1151 (in Chinese). doi: 10.13700/j.bh.1001-5965.2023.0241.
    [3]YANG Y,CHEN F. Dehazing network based on residual global contextual attention and cross-layer feature fusion[J]. Journal of Beijing University of Aeronautics and Astronautics,2025,51(4):1048-1058 (in Chinese). doi: 10.13700/j.bh.1001-5965.2023.0194.
    [4]WAN B,SU X C,WANG J,et al. A precise landing control method based on model predictive control algorithm[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(4):1197-1207 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0383.
    [5]ZUO L,ZHANG X L,LI Z Y,et al. UAV control law design method based on active-disturbance rejection control[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(5):1512-1522 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0488.
    [6]ZHANG Y L,MA Z Z,SHI L,et al. Multi-agent coverage control based on communication connectivity maintenance constraints[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(2):519-528 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0340.
    [7]ZHANG Y Z,LI Y. Research on abstractive text summarization based on triplet information guidance[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(12):3677-3685 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0896.
    [8]ZHANG Zhihao, DU Lixia, HAO Ziwei, HOU Yue. Multi-core contextual feature-guided algorithm for trusted detection of UAV aerial images[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2024.0548
    [9]LI Yun-hong, ZHANG Fu-xing, SU Xue-ping, LI Li-min, WANG Mei, LIANG Cheng-ming. Real-time UAV image segmentation algorithm with enhanced contextual feature interaction[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2023.0830
    [10]CHEN Hongsong, ZHAO Xiufeng. Role labeling rules and governance language standardization suggestions of cyber violence public opinion on Weibo[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2024.0651
    [11]REN Yong, DUO Lin, XU Boyu, YANG Xin. Infrared small target detection based on dual-domain and global context feature extraction[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2024.0048
    [12]WU Yu-zhan, LI Chen-long, GONG Guang-hong, LU Jun-yan. Finite-time path tracking control of unmanned vehicles based on multi-dimensional Taylor network[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2023.0610
    [13]CHEN Y,JIANG Q L,WANG J S,et al. Current chopping control strategy of switched reluctance motor based on inductance characteristics[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(3):647-656 (in Chinese). doi: 10.13700/j.bh.1001-5965.2021.0269.
    [14]SONG Z R,ZHAO J C,YANG W F. Boundary protection control method of helicopter power system based on flight test analysis[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(1):100-105 (in Chinese). doi: 10.13700/j.bh.1001-5965.2021.0431.
    [15]WANG C Y,YANG L M,LI Y H. A mapping leader formation control strategy for multiple mobile robots based on two-stage sliding mode control[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(11):3108-3114 (in Chinese). doi: 10.13700/j.bh.1001-5965.2021.0792.
    [16]CHEN T T,WANG F Y,XIA C Y,et al. Tracking control of multi-agent systems based on persistent-hold mechanism[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(12):3321-3327 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0065.
    [17]SHAO Wei-zhi, XIONG Si-yu, PAN Li-li. Semi-supervised image retrieval based on triplet hash loss[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2023.0451
    [18]CHEN H,BAI J,YIN C T,et al. Behavior based MOOC user dropout predication framework[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(1):74-82 (in Chinese). doi: 10.13700/j.bh.1001-5965.2021.0188.
    [19]LUO Gai-fang, XU Dan, ZHANG Hao. Image Sentiment Analysis by Combing Contextual Correlation[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2023.0345
    [20]BAI Luo, ZHANG Hongli, WANG Cong. Target tracking algorithm based on efficient attention and context awareness[J]. Journal of Beijing University of Aeronautics and Astronautics, 2022, 48(7): 1222-1232. doi: 10.13700/j.bh.1001-5965.2021.0013
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(4058) PDF downloads(894) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return