Integrating Permission Hierarchy with the Core RBAC model

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Role Slices: A Notation for RBAC Permission Assignment and Enforcement

During the past decade, there has been an explosion in the complexity of software applications, with an increasing emphasis on software design via model-driven architectures, patterns, and models such as the unified modeling language (UML). Despite this, the integration of security concerns throughout the product life cycle has lagged, resulting in software infrastructures that are untrustworth...

متن کامل

Integrating RBAC Mechanisms in a Web Server

Hypermedia systems (whether web sites or not) should support multilevel policiesm, offering different views and manipulation abilities of the same information to users with different needs in a particular context. Several experiences have demonstrated that role-based access control (RBAC) policies are a powerful mechanism to simplify management tasks. This paper describes the implementation and...

متن کامل

Towards User-Oriented RBAC Model

Role mining is to define a role set to implement the role-based access control (RBAC) system and regarded as one of the most important and costliest implementation phases. While various role mining models have been proposed, we find that user experience/perception – one ultimate goal for any information system – is surprisingly ignored by the existing works. One advantage of RBAC is to support ...

متن کامل

An Access Control Model of Workflow System Integrating RBAC and TBAC

Basing on the integration of two models, RBAC and TBAC, an access control model called Role-Task Based Access Control (R&TBAC) is given, which takes two parts as combining sites, one is the role and trustee, the other is the role permission assignment and trustee permissions. A set of fundamental conceptions, a series of authorization processes, a formalized description and some modeling tools ...

متن کامل

Android Permission Model

The recent evolution on the smart phone technology has made its application market huge and less secure. Every single day large number of apps introduced in the android market (mostly on google play store) without any particular inspections which creates a lot of security issues and they remain unresolved. There are a lot of recent and increasing security issues which are mostly caused by the a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Energy Procedia

سال: 2011

ISSN: 1876-6102

DOI: 10.1016/j.egypro.2011.11.589