会议专题

Research and implementation of a new access-control model

Authoritative survey shows that the system security threats mainly came from internal. In the analysis of traditional RBAC model and the status of the current study, by the introduction of the concept of security roles, a new access control model which need to be verified— V - RBAC was presented. aimed at the problems of traditional RBAC model in the prevention of internal threats from authorized users. The improved model effective solved the shortage of the management of authorized users in general RBAC model ,so avoiding the threats due to malicious or errors and other dangerous operations. In the formal definition is given of the model, as well as rules, with an actual project, the implementation of the model methods are analyzed and studied.

RBAC inside threat security role security user

Long-Jun Huang Feng-bin Wang

School of Software JiangXi Normal University NanChang,China College of Software Nanchang Hangkong University, Nanchang, China

国际会议

2010 International Conference on Future Information Technology(2010年未来信息技术国际会议 ICFIT 2010)

长沙

英文

5-8

2010-12-14(万方平台首次上网日期,不代表论文的发表时间)