Research and implementation of a new access-control model
Authoritative survey shows that the system security threats mainly came from internal. In the analysis of traditional RBAC model and the status of the current study, by the introduction of the concept of security roles, a new access control model which need to be verified— V - RBAC was presented. aimed at the problems of traditional RBAC model in the prevention of internal threats from authorized users. The improved model effective solved the shortage of the management of authorized users in general RBAC model ,so avoiding the threats due to malicious or errors and other dangerous operations. In the formal definition is given of the model, as well as rules, with an actual project, the implementation of the model methods are analyzed and studied.
RBAC inside threat security role security user
Long-Jun Huang Feng-bin Wang
School of Software JiangXi Normal University NanChang,China College of Software Nanchang Hangkong University, Nanchang, China
国际会议
2010 International Conference on Future Information Technology(2010年未来信息技术国际会议 ICFIT 2010)
长沙
英文
5-8
2010-12-14(万方平台首次上网日期,不代表论文的发表时间)