Access control has made a long way from 1960s. With the advent changes of technologies pertaining to location transparency in storage of data, there arises different access control scenarios. Cloud storage, the predom...Access control has made a long way from 1960s. With the advent changes of technologies pertaining to location transparency in storage of data, there arises different access control scenarios. Cloud storage, the predominant storage that is being in use currently, also paves way to various access control problems. Though there are various access control mechanisms such as RBAC, ABAC, they are designed on the user’s perspective such as the role held by the user or other attributes assigned to the user. A new access control mechanism called object relationship based access control (RoBAC) has been developed based on the relations held among the users. The policy decision of access control is based on the relationship among the classes followed in the Java programming. Results have shown that this model best suits various scenarios in the cloud environment, and it also shows that the time for making decision either to allow or to deny is reduced compared to the existing system.展开更多
The access control is very important for the information management of modern enterprises . This paperproposes a framework of well-defined constraint specifications for developers to build application-level access con...The access control is very important for the information management of modern enterprises . This paperproposes a framework of well-defined constraint specifications for developers to build application-level access controlbased on users' roles. They ensure that each role is configured with consistent privileges, each actor is authorized toproper roles and then each actor can activate and play his authorized roles without interest conflicts. These formalconstraint specifications are described by the first-order predicate logic, and also some properties are proved. Themodel provides relatively independent, consistent and inferable constraint specifications for developers to design ac-cess control of large and complex enterprise systems.展开更多
文摘Access control has made a long way from 1960s. With the advent changes of technologies pertaining to location transparency in storage of data, there arises different access control scenarios. Cloud storage, the predominant storage that is being in use currently, also paves way to various access control problems. Though there are various access control mechanisms such as RBAC, ABAC, they are designed on the user’s perspective such as the role held by the user or other attributes assigned to the user. A new access control mechanism called object relationship based access control (RoBAC) has been developed based on the relations held among the users. The policy decision of access control is based on the relationship among the classes followed in the Java programming. Results have shown that this model best suits various scenarios in the cloud environment, and it also shows that the time for making decision either to allow or to deny is reduced compared to the existing system.
文摘The access control is very important for the information management of modern enterprises . This paperproposes a framework of well-defined constraint specifications for developers to build application-level access controlbased on users' roles. They ensure that each role is configured with consistent privileges, each actor is authorized toproper roles and then each actor can activate and play his authorized roles without interest conflicts. These formalconstraint specifications are described by the first-order predicate logic, and also some properties are proved. Themodel provides relatively independent, consistent and inferable constraint specifications for developers to design ac-cess control of large and complex enterprise systems.