The Design of Visual RBAC Model Based on UML and XACML Integrating

被引:0
|
作者
Fan, Baode [1 ]
Li, Mengmeng [1 ]
机构
[1] Yantai Univ, Sch Comp Sci, Yantai, Shandong, Peoples R China
来源
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON SOFT COMPUTING TECHNIQUES AND ENGINEERING APPLICATION, ICSCTEA 2013 | 2014年 / 250卷
关键词
XACML; RBAC; Model integration; Role-permission; Score management;
D O I
10.1007/978-81-322-1695-7_25
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security is an indispensable part of modern software system. Access control is an important measure to guarantee the security of a system; however, the modeling of modern software system does not deal with security, which brings great hidden danger in later security maintenance and the system integration. In this paper, we use a score management system as an example, describe the visualization modeling of RBAC model using the visualized UML, and provide the details about the modeling method and concrete realization of the RBAC model into this system. At the same time, we describe the permissions between users and objects in the RBAC model, combined with eXtensible Access Control Markup Language (XACML), realized the formal description of the access control policy, simplified authorization, and increased the security of the model.
引用
收藏
页码:213 / 222
页数:10
相关论文
共 46 条
  • [21] Behavior Recognition Based on RBAC-Ensemble Model
    Liu, Chong
    Cheng, Shaoyin
    Luo, Yuxuan
    Jiang, Fan
    2019 11TH INTERNATIONAL CONFERENCE ON KNOWLEDGE AND SMART TECHNOLOGY (KST), 2019, : 29 - 34
  • [22] A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC
    Jin, Xin
    Krishnan, Ram
    Sandhu, Ravi
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 41 - 55
  • [23] Fine-grained Access Control Model Based on RBAC
    Gao, Lei
    Pan, Shulin
    AUTOMATION EQUIPMENT AND SYSTEMS, PTS 1-4, 2012, 468-471 : 1667 - +
  • [24] Towards secure dynamic collaborations with group-based RBAC model
    Li, Qi
    Zhang, Xinwen
    Xu, Mingwei
    Wu, Jianping
    COMPUTERS & SECURITY, 2009, 28 (05) : 260 - 275
  • [25] Semantic Rule Based RBAC Extension Model for Flexible Resource Allocation
    Zou, Yunfeng
    Deng, Junhua
    Xu, Chao
    Liang, Xiao
    Chen, Xiaona
    2019 12TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2019), 2019, : 221 - 224
  • [26] A Role and Context Based Access Control Model with UML
    Bao, Yubin
    Song, Jie
    Wang, Daling
    Shen, Derong
    Yu, Ge
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1175 - 1180
  • [27] Implementation of Permission Management Based on Spring Security and RBAC1 Model
    Xiong, Yuanwei
    Wu, Weiming
    Gu, Yonghao
    2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SCIENCE AND APPLICATION (FCSA 2011), VOL 3, 2011, : 530 - 533
  • [28] CBR-based negotiation RBAC model for enhancing ubiquitous resources management
    Tseng, Shian-Shyong
    Chen, Hsing-Chung
    Hu, Li-Ling
    Lin, Yen-Tsung
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2017, 37 (01) : 1539 - 1550
  • [29] uT-RBAC: Ubiquitous role-based access control model
    Chae, SH
    Kim, W
    Kim, DK
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01): : 238 - 239
  • [30] The Model of Access Control of E-business Website based on PMI/RBAC
    Wu, Peng
    Wang, Zhao
    Wan, Jiexi
    ITCS: 2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, PROCEEDINGS, VOL 2, PROCEEDINGS, 2009, : 246 - 249