A Policy Based Access Control Model of PDM System

被引:0
作者
Ye, C. X. [1 ]
Fu, Y. Q. [2 ]
机构
[1] Chongqing Univ, Coll Comp Sci, Chongqing, Peoples R China
[2] Chongqing Univ, Coll Software Engn, Chongqing, Peoples R China
来源
ADVANCES IN MATERIALS MANUFACTURING SCIENCE AND TECHNOLOGY XIII, VOL 1: ADVANCED MANUFACTURING TECHNOLOGY AND EQUIPMENT, AND MANUFACTURING SYSTEMS AND AUTOMATION | 2009年 / 626-627卷
基金
国家高技术研究发展计划(863计划); 中国国家自然科学基金;
关键词
PDM; Security; Access Control; Access Control Policy;
D O I
10.4028/www.scientific.net/MSF.626-627.735
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In PDM system, there exist many users, such as employees, partners, and customers. To protect resource from illegal access, it is very important to enforce access control policy in PDM system. RBAC is widely used as an access control model in PDM system But, it is difficult for RBAC to support complex access control policy This paper proposed a simple, flexible way to express and enforce access control policy To keep the integrity of system security and make the system administer work easier, we propose auto revocation triggered by time and access control policy in our model At the end of this paper Introduces a system architecture and auto revocation algorithm. We also give some examples to show how this model works in PDM system
引用
收藏
页码:735 / +
页数:2
相关论文
共 9 条
[1]  
BEZNOSOW K, 2000, ENG ACCESS CONTROL D
[2]  
Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980
[3]  
Han Weili, 2002, Journal of Computer Aided Design & Computer Graphics, V14, P333
[4]  
KIM JA, 1998, P 28 INT C TECHN OBJ
[5]  
LINDEMAN DD, 1994, ANN REL MAIN S 1994
[6]  
SHEN HH, 1992, P ACM CSCW 92 C COMP
[7]  
TONG BS, 2000, TECHNOLOGY PRODUCT D
[8]  
XU XW, 2003, ROBOTICS COMPUTER IN, V16, P315
[9]  
Yin Jian-Wei, 2001, Journal of Computer Aided Design & Computer Graphics, V13, P971