Volume 32 Issue 07
Jul.  2006
Turn off MathJax
Article Contents
Zhu Xiaojie, Xiong Zhang, Wu Jinget al. New model for token role-based access control on enterprise portal[J]. Journal of Beijing University of Aeronautics and Astronautics, 2006, 32(07): 873-876. (in Chinese)
Citation: Zhu Xiaojie, Xiong Zhang, Wu Jinget al. New model for token role-based access control on enterprise portal[J]. Journal of Beijing University of Aeronautics and Astronautics, 2006, 32(07): 873-876. (in Chinese)

New model for token role-based access control on enterprise portal

  • Received Date: 25 Jul 2005
  • Publish Date: 31 Jul 2006
  • Manage users and access rights are a complex and challengeable job in enterprise portal. Importing the role concept may simplify the access control, but its implementation is usually constrained by the single system and application. A new model,TRBAC(token role-based access control), was proposed for RBAC(role-based access control)on enterprise portal, which integrated the SSO(single sign on) technology and combined the RBAC model with token access mechanism. The role could span all web systems in portal. It was a token-based and dynamic-activated access control model, which could dynamically adjust the access rights according to user access requirement. It solved the problems on user management and access control management, and supported the corporate security standards, central auditing and control. The practice indicates that TRBAC improves the system efficiency and ensures the security.

     

  • loading
  • [1] 徐家俊,贾文玉.企业信息门户EIP[M].北京:机械工业出版社,2004 Xu Jiajun,Jia Wenyu.Enterprise information portal[M].Beijing:China Machine Press,2004(in Chinese) [2] Ferraiolo David,Kuhn Richard.Role-based access controls Proceedings of the 15th NIST-NCSC National Computer Security Conference. Baltimore:NIST-NCSC,1992:554-563 [3] Ferraiolo David,Barkley John,Kuhn Richard.A role-based access control model and reference implementation within a corporate intranet[J]. ACM Transaction on Information and System Security,1999,2(1):34-64 [4] 许峰,赖海光,黄皓,等.面向服务的角色访问控制技术研究[J].计算机学报,2005,28(4):686-693 Xu Feng,Lai Haiguang,Huang Hao,et al.Service-oriented role-based access control[J].Chinese Journal of Computers,2005,28(4):686-693(in Chinese) [5] Saltzer J H,Schroeder M D.The protection of information in computer systems[J].Proceedings of the IEEE,1975,63(9):1278-1308 [6] Wood C,Fernandez E B.Authorization in a decentralized database system Proceedings of the 5th International Conference on Very Large Databases.Brazil:IEEE Computer Society, 1979:352-359
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(2643) PDF downloads(1268) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return