The Design of Visual RBAC Model Based on UML and XACML Integrating

被引:0
作者
Fan, Baode [1 ]
Li, Mengmeng [1 ]
机构
[1] Yantai Univ, Sch Comp Sci, Yantai, Shandong, Peoples R China
来源
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON SOFT COMPUTING TECHNIQUES AND ENGINEERING APPLICATION, ICSCTEA 2013 | 2014年 / 250卷
关键词
XACML; RBAC; Model integration; Role-permission; Score management;
D O I
10.1007/978-81-322-1695-7_25
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security is an indispensable part of modern software system. Access control is an important measure to guarantee the security of a system; however, the modeling of modern software system does not deal with security, which brings great hidden danger in later security maintenance and the system integration. In this paper, we use a score management system as an example, describe the visualization modeling of RBAC model using the visualized UML, and provide the details about the modeling method and concrete realization of the RBAC model into this system. At the same time, we describe the permissions between users and objects in the RBAC model, combined with eXtensible Access Control Markup Language (XACML), realized the formal description of the access control policy, simplified authorization, and increased the security of the model.
引用
收藏
页码:213 / 222
页数:10
相关论文
共 47 条
  • [31] The Model of Access Control of E-business Website based on PMI/RBAC
    Wu, Peng
    Wang, Zhao
    Wan, Jiexi
    ITCS: 2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, PROCEEDINGS, VOL 2, PROCEEDINGS, 2009, : 246 - 249
  • [32] Access Process of Data-Flow in Cross-Domain Usage Control Model Based on XACML
    Dai, Changying
    Gong, Wentao
    Liu, Jing
    SMART MATERIALS AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2011, 143-144 : 1275 - +
  • [33] XACML-based semantic rules language and ontological model for reconciling semantic differences of access control rules
    Manal, Lamri
    Lyazid, Sabri
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2023, 43 (01) : 1 - 17
  • [34] Research on an Access Control Model for Radio and Television Monitoring Software Based on T-RBAC
    Wang, Zizhe
    Tian, Pei
    Jin, Xiang
    MECHANICAL DESIGN AND POWER ENGINEERING, PTS 1 AND 2, 2014, 490-491 : 1531 - 1535
  • [35] RBAC Role-Permission Assignment with Conflicting Constraints Based on The E-CARGO Model
    Zhang, Wei
    Zhu, Jingxin
    Liu, Dongning
    Teng, Shaohua
    Zhu, Haibin
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON COGNITIVE INFORMATICS & COGNITIVE COMPUTING (ICCI-CC), 2014, : 424 - 430
  • [36] Collaboration IoT-Based RBAC with Trust Evaluation Algorithm Model for Massive IoT Integrated Application
    Hsing-Chung Chen
    Mobile Networks and Applications, 2019, 24 : 839 - 852
  • [37] Collaboration IoT-Based RBAC with Trust Evaluation Algorithm Model for Massive IoT Integrated Application
    Chen, Hsing-Chung
    MOBILE NETWORKS & APPLICATIONS, 2019, 24 (03) : 839 - 852
  • [38] Integrating diverse paradigms in evolution and maintenance by an XML-based unified model
    Lu, CW
    Chu, WC
    Chang, CH
    Yang, DL
    Lian, WD
    JOURNAL OF SOFTWARE MAINTENANCE AND EVOLUTION-RESEARCH AND PRACTICE, 2003, 15 (03): : 111 - 144
  • [39] Design and Implementation of a Context-Based Security Model
    Iijima, Tadashi
    Kido, Satoshi
    KNOWLEDGE-BASED SOFTWARE ENGINEERING, JCKBSE 2014, 2014, 466 : 356 - 370
  • [40] An integrated Solution to the Security User Access in the RETELAB Grid Project, using a Web System based in Portlets and a RBAC Model by means of User Attribute Certificates and PKI
    Mera, David
    Cotos, Jose M.
    Saco, Pedro
    Gomez, Andres
    IBERGRID: 2ND IBERIAN GRID INFRASTRUCTURE CONFERENCE PROCEEDINGS, 2008, : 296 - +