Integrating TBAC and RBAC for Dynamic Access Control
碩士 === 南華大學 === 資訊管理學系碩士班 === 90 === Traditionally, the individual users are the main consideration in computer authorization-identification system. However, it needs to set a large amount of installation when the employees changed. Role-Based Access Control (RBAC), distributes the user''s...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2002
|
Online Access: | http://ndltd.ncl.edu.tw/handle/70003021480173704999 |
id |
ndltd-TW-090NHU00396018 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-090NHU003960182015-10-13T10:19:23Z http://ndltd.ncl.edu.tw/handle/70003021480173704999 Integrating TBAC and RBAC for Dynamic Access Control 整合角色和工作為基礎的動態存取控制架構研究 Jin-Jiey Lee 李俊傑 碩士 南華大學 資訊管理學系碩士班 90 Traditionally, the individual users are the main consideration in computer authorization-identification system. However, it needs to set a large amount of installation when the employees changed. Role-Based Access Control (RBAC), distributes the user''s authorization by the subject of roles, single or multiple, which builds the formation of whole access control structure. What the merit of this structure is to renew the user and the roles only when the members changed. Though the RBAC is a convenient managerial tool, it is lack of workflow-management, which is very important to an enterprise. On the other hand, Task-Based Authorization Control (TBAC), focus on the object of tasks, not only considers the conflicting between tasks, but also builds an authorization-step to manage every workflow. The study is based on RBAC and combined the TBAC which stressed workflow. It proposes a model of dynamic state access control to examine the probability of the model from the correlativity between tasks, and to break through the limitation of duty-conflict, task order, and task dependency during the executive period. The model not only resolves the problem of the roles lacked of workflow, but also deals with the flaw caused by the change of workflow during the executive period possibly. Because of concluding the need of static state and dynamic state access control, it is full of elasticity and practicability. Cheng-Chih Hsu 許成之 2002 學位論文 ; thesis 55 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 南華大學 === 資訊管理學系碩士班 === 90 === Traditionally, the individual users are the main consideration in computer authorization-identification system. However, it needs to set a large amount of installation when the employees changed. Role-Based Access Control (RBAC), distributes the user''s authorization by the subject of roles, single or multiple, which builds the formation of whole access control structure. What the merit of this structure is to renew the user and the roles only when the members changed.
Though the RBAC is a convenient managerial tool, it is lack of workflow-management, which is very important to an enterprise. On the other hand, Task-Based Authorization Control (TBAC), focus on the object of tasks, not only considers the conflicting between tasks, but also builds an authorization-step to manage every workflow.
The study is based on RBAC and combined the TBAC which stressed workflow. It proposes a model of dynamic state access control to examine the probability of the model from the correlativity between tasks, and to break through the limitation of duty-conflict, task order, and task dependency during the executive period. The model not only resolves the problem of the roles lacked of workflow, but also deals with the flaw caused by the change of workflow during the executive period possibly. Because of concluding the need of static state and dynamic state access control, it is full of elasticity and practicability.
|
author2 |
Cheng-Chih Hsu |
author_facet |
Cheng-Chih Hsu Jin-Jiey Lee 李俊傑 |
author |
Jin-Jiey Lee 李俊傑 |
spellingShingle |
Jin-Jiey Lee 李俊傑 Integrating TBAC and RBAC for Dynamic Access Control |
author_sort |
Jin-Jiey Lee |
title |
Integrating TBAC and RBAC for Dynamic Access Control |
title_short |
Integrating TBAC and RBAC for Dynamic Access Control |
title_full |
Integrating TBAC and RBAC for Dynamic Access Control |
title_fullStr |
Integrating TBAC and RBAC for Dynamic Access Control |
title_full_unstemmed |
Integrating TBAC and RBAC for Dynamic Access Control |
title_sort |
integrating tbac and rbac for dynamic access control |
publishDate |
2002 |
url |
http://ndltd.ncl.edu.tw/handle/70003021480173704999 |
work_keys_str_mv |
AT jinjieylee integratingtbacandrbacfordynamicaccesscontrol AT lǐjùnjié integratingtbacandrbacfordynamicaccesscontrol AT jinjieylee zhěnghéjiǎosèhégōngzuòwèijīchǔdedòngtàicúnqǔkòngzhìjiàgòuyánjiū AT lǐjùnjié zhěnghéjiǎosèhégōngzuòwèijīchǔdedòngtàicúnqǔkòngzhìjiàgòuyánjiū |
_version_ |
1716827867734605824 |