Attribute-Based Access Control of Collaborative design systems

被引:0
|
作者
Fan, Tongrang [1 ]
Guo, Hongyong [2 ]
Li, Yanjing [1 ]
机构
[1] Shijiazhuang Tiedao Univ, Sch Informat Sci & Technol, Shijiazhuang, Peoples R China
[2] Hebei Sci & Technol Informat Inst, Hebei, Peoples R China
关键词
collaborative design; attribute-based access control; role; task;
D O I
10.4028/www.scientific.net/AMR.267.80
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The current research in access control is analyzed, and the features of access control in collaborative design systems are discussed. According to the new requirements of the access control technology in collaborative design systems, the attribute-based access control (ABAC) model is improved to a new one: supporting role and task ABAC model. The concept of role entity and task entity is introduced into the ABAC model. The formal definition and object model of the improved model are given, and the features of the newly-introduced model elements are discussed.
引用
收藏
页码:80 / 85
页数:6
相关论文
共 50 条
  • [41] Levelled attribute-based encryption for hierarchical access control
    Le, Huy Quoc
    Le, Phi Thuong
    Trinh, Sy Tuan
    Susilo, Willy
    Trinh, Viet Cuong
    COMPUTER STANDARDS & INTERFACES, 2025, 93
  • [42] A Time and Mutable Attribute-Based Access Control Model
    Yang, Ran
    Lin, Chuang
    Feng, Fujun
    JOURNAL OF COMPUTERS, 2009, 4 (06) : 510 - 518
  • [43] Efficient Attribute-Based Comparable Data Access Control
    Wang, Zhijie
    Huang, Dijiang
    Zhu, Yan
    Li, Bing
    Chung, Chun-Jen
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (12) : 3430 - 3443
  • [44] Attribute-Based Access Control Architectures with the eIDAS Protocols
    Morgner, Frank
    Bastian, Paul
    Fischlin, Marc
    SECURITY STANDARDISATION RESEARCH, SSR 2016, 2016, 10074 : 205 - 226
  • [45] Attribute-based access control policy specification language
    Ye, Chunxiao
    Zhong, Jiang
    Feng, Yong
    Journal of Southeast University (English Edition), 2008, 24 (03) : 260 - 263
  • [46] Automated trust negotiation in attribute-based access control
    Winsborough, WH
    Jacobs, J
    DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 252 - 257
  • [47] Attribute-based Access Control for ICN Naming Scheme
    Li, Bing
    Verleker, Ashwin Prabhu
    Huang, Dijiang
    Wang, Zhijie
    Zhu, Yan
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 391 - 399
  • [48] Attribute-based access control policies composition algebra
    Lin, Li
    Huai, Jin-Peng
    Li, Xian-Xian
    Ruan Jian Xue Bao/Journal of Software, 2009, 20 (02): : 403 - 414
  • [49] Attribute-based access control management for multicloud collaboration
    John, John C.
    Sural, Shamik
    Gupta, Arobinda
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (19):
  • [50] Attribute-based access control model for cloud computing
    Wang, Jingyu
    Feng, Lixiao
    Zheng, Xuefeng
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2015, 46 (06): : 2090 - 2097