• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wu Xinsong, He Yeping, Zhou Zhouyi, Liang Hongliang. An Environment-Adaptive Role-Based Access Control Model[J]. Journal of Computer Research and Development, 2011, 48(6): 983-990.
Citation: Wu Xinsong, He Yeping, Zhou Zhouyi, Liang Hongliang. An Environment-Adaptive Role-Based Access Control Model[J]. Journal of Computer Research and Development, 2011, 48(6): 983-990.

An Environment-Adaptive Role-Based Access Control Model

More Information
  • Published Date: June 14, 2011
  • Large scale network-based applications, such as infectious diseases reporting system, require that access control policy can be changed according to environment alternation. However, existing access control models are inflexible and can not be adapted to environment alternation because they are lack of mechanisms to capture environment alternation and to change access control policy. In this paper, we analyze the access control requirements of infectious diseases reporting system. Based on the analysis, we extract the general access control requirements of large scale network-based applications. Through extending RBAC model, we design the components of the environment-adaptive role-based access control model called EA-RBAC and give the formal definition of the model. Compared with traditional RBAC models, EA-RBAC model adds event-trigger, event-based equivalent states transition, environment role and virtual domain mechanisms. Through event-trigger and equivalent states transition, the system can perceive environment alternation and transit state based on environment alternation. Through environment role and virtual domains, the system can dynamically adjust environment role and user authorization based on current state. EA-RBAC model can enforce flexible access control policy for large scale network-based applications while holds security. Also, as an example, this paper gives the applicability analysis of EA-RBAC model in infectious disease reporting system.
  • Related Articles

    [1]Luo Jun, Zhao Chuanzhi, Wang Fei. An Efficient Privilege Manage Method Based on RBAC[J]. Journal of Computer Research and Development, 2016, 53(5): 1000-1008. DOI: 10.7544/issn1000-1239.2016.20148288
    [2]Chen Lili, Shen Li, Wang Zhiying, Xiao Nong, and Yao Yiping. Computation Accelerator Virtualization for Domain Specific Applications[J]. Journal of Computer Research and Development, 2011, 48(11): 2103-2110.
    [3]Zhang Yingjun, Feng Dengguo. A Role-Based Access Control Model Based on Space, Time and Scale[J]. Journal of Computer Research and Development, 2010, 47(7): 1252-1260.
    [4]Tang Zhuo, Zhao Lin, Li Kenli, Li Ruixuan. A Dynamic Access Control Model for Inter-Operation in Multi-Domain Environment Based on Risk[J]. Journal of Computer Research and Development, 2009, 46(6): 948-955.
    [5]Xia Luning and Jing Jiwu. An Administrative Model for Role-Based Access Control Using Hierarchical Namespace[J]. Journal of Computer Research and Development, 2007, 44(12): 2020-2027.
    [6]He Yongzhong, Li Xiaofeng, Feng Dengguo. Implementing Chinese Wall Policies on RBAC[J]. Journal of Computer Research and Development, 2007, 44(4): 615-622.
    [7]Chen Ying, Yang Shoubao, Guo Leitao, and Shen Kai. A Dynamic Access Control Scheme Across Multi-Domains in Grid Environment[J]. Journal of Computer Research and Development, 2006, 43(11): 1863-1869.
    [8]Liao Junguo, Hong Fan, Zhu Xian, Xiao Haijun. Separation of Duty in Dynamic Role Translations Between Administrative Domains[J]. Journal of Computer Research and Development, 2006, 43(6): 1065-1070.
    [9]Sui Aina, Wu Wei, Chen Xiaowu, Zhao Qinping. A Assembly Constraint Semantic Model in Distributed Virtual Environment[J]. Journal of Computer Research and Development, 2006, 43(3): 542-550.
    [10]Zhang Yu, Zhang Wenyi, Li Xianxian, and Huai Jinpeng. Secure Access Control for Group Communication on Multi-Autonomous Domains Collaborative Environment[J]. Journal of Computer Research and Development, 2005, 42(9): 1558-1563.

Catalog

    Article views (701) PDF downloads (591) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return