An Implementation of Authorization Management in Task-Based Access Control Models
碩士 === 國立交通大學 === 資訊管理所 === 88 === In task-based access control (TBAC) models, duty-conflict tasks are the basis of authorization management to determine the assignment of tasks to roles and users. Some studies have shown that TBAC models are more suitable for task-oriented operational business envi...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2000
|
Online Access: | http://ndltd.ncl.edu.tw/handle/74894547566946397227 |
id |
ndltd-TW-088NCTU0396026 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-088NCTU03960262015-10-13T10:59:52Z http://ndltd.ncl.edu.tw/handle/74894547566946397227 An Implementation of Authorization Management in Task-Based Access Control Models 實作以工作為基礎的存取控制模式之授權管理 Hsu-Teng Lee 李旭登 碩士 國立交通大學 資訊管理所 88 In task-based access control (TBAC) models, duty-conflict tasks are the basis of authorization management to determine the assignment of tasks to roles and users. Some studies have shown that TBAC models are more suitable for task-oriented operational business environments than other access control schemes are. Based upon object-oriented technology and three-tier system architecture, this study designs and implements an extensible system capable of conducting authorization management of TBAC models. The system is incorporated with various authorization rules to achieve separation of duty in the assignment of tasks to roles and users. Graphical interface is also supported for security managers to specify tasks, roles and users, as well as to enact appropriate authorization rules according to security requirements. Secured task-based access control to system resources can thus be enforced via effective authorization management. Finally, a real purchasing case is analyzed and employed into the system to demonstrate how authorization management can be effectively conducted via using the developed system. Duen-Ren Liu 劉敦仁 2000 學位論文 ; thesis 89 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立交通大學 === 資訊管理所 === 88 === In task-based access control (TBAC) models, duty-conflict tasks are the basis of authorization management to determine the assignment of tasks to roles and users. Some studies have shown that TBAC models are more suitable for task-oriented operational business environments than other access control schemes are.
Based upon object-oriented technology and three-tier system architecture, this study designs and implements an extensible system capable of conducting authorization management of TBAC models. The system is incorporated with various authorization rules to achieve separation of duty in the assignment of tasks to roles and users. Graphical interface is also supported for security managers to specify tasks, roles and users, as well as to enact appropriate authorization rules according to security requirements. Secured task-based access control to system resources can thus be enforced via effective authorization management. Finally, a real purchasing case is analyzed and employed into the system to demonstrate how authorization management can be effectively conducted via using the developed system.
|
author2 |
Duen-Ren Liu |
author_facet |
Duen-Ren Liu Hsu-Teng Lee 李旭登 |
author |
Hsu-Teng Lee 李旭登 |
spellingShingle |
Hsu-Teng Lee 李旭登 An Implementation of Authorization Management in Task-Based Access Control Models |
author_sort |
Hsu-Teng Lee |
title |
An Implementation of Authorization Management in Task-Based Access Control Models |
title_short |
An Implementation of Authorization Management in Task-Based Access Control Models |
title_full |
An Implementation of Authorization Management in Task-Based Access Control Models |
title_fullStr |
An Implementation of Authorization Management in Task-Based Access Control Models |
title_full_unstemmed |
An Implementation of Authorization Management in Task-Based Access Control Models |
title_sort |
implementation of authorization management in task-based access control models |
publishDate |
2000 |
url |
http://ndltd.ncl.edu.tw/handle/74894547566946397227 |
work_keys_str_mv |
AT hsutenglee animplementationofauthorizationmanagementintaskbasedaccesscontrolmodels AT lǐxùdēng animplementationofauthorizationmanagementintaskbasedaccesscontrolmodels AT hsutenglee shízuòyǐgōngzuòwèijīchǔdecúnqǔkòngzhìmóshìzhīshòuquánguǎnlǐ AT lǐxùdēng shízuòyǐgōngzuòwèijīchǔdecúnqǔkòngzhìmóshìzhīshòuquánguǎnlǐ AT hsutenglee implementationofauthorizationmanagementintaskbasedaccesscontrolmodels AT lǐxùdēng implementationofauthorizationmanagementintaskbasedaccesscontrolmodels |
_version_ |
1716835431339786240 |