Using a Bitemporal Relation-based Reliable Auditing Mechanism on the Organizational Privilege Accountability

碩士 === 中國文化大學 === 資訊管理研究所 === 92 === The RBAC (role-based access control) separated user, role, and privilege. It provides roles with access rights, maps users to roles, and grants users with appropriate privileges. The RBAC comes with many characteristics such as, privilege management, hierarchy, m...

Full description

Bibliographic Details
Main Authors: Hung-Yi Lee, 李虹儀
Other Authors: Dwen - Ren Tsai
Format: Others
Language:zh-TW
Published: 2004
Online Access:http://ndltd.ncl.edu.tw/handle/43902745677140863588
id ndltd-TW-092PCCU0396013
record_format oai_dc
spelling ndltd-TW-092PCCU03960132015-10-13T13:28:06Z http://ndltd.ncl.edu.tw/handle/43902745677140863588 Using a Bitemporal Relation-based Reliable Auditing Mechanism on the Organizational Privilege Accountability 使用雙時間關係之可靠稽核機制應用於組織中職權責任可歸屬性 Hung-Yi Lee 李虹儀 碩士 中國文化大學 資訊管理研究所 92 The RBAC (role-based access control) separated user, role, and privilege. It provides roles with access rights, maps users to roles, and grants users with appropriate privileges. The RBAC comes with many characteristics such as, privilege management, hierarchy, minimum privilege, authorization separation, and object classification. The bitemporal database will log account activities and process time indices, while authorized system users access and query any information. It can make data integrity, access control, and tracing accomplish certain level of security. It also can make effective audit and monitor on misbehaviors of employees. Traditional certificate management systems use normal databases. In these systems, the storage and maintenance of certificates are implemented by replacing old certificates with new ones. This makes data audit a tough task. Managing authorization policies and certificate data adopting bitemporal databases, auditors can check and analyze certificate data, and then find out suspicious data. This study applied the RBAC theory, combining with bitemporal databases, to the complex enterprise environments. We also use certificate authorizing polices bitemporally managing the databases. Our system can detect the usages of enterprise systems and data. The system can also report violations to the auditors. Auditors can thereby properly react. This work focuses on enterprise auditing management of database system under PKI (public key infrastructure) and PMI (privilege management infrastructure). Hopefully, through effective certificate record management, data integrity is ensured. At the same time, legal users can be audited effectively. Dwen - Ren Tsai 蔡敦仁 2004 學位論文 ; thesis 87 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 中國文化大學 === 資訊管理研究所 === 92 === The RBAC (role-based access control) separated user, role, and privilege. It provides roles with access rights, maps users to roles, and grants users with appropriate privileges. The RBAC comes with many characteristics such as, privilege management, hierarchy, minimum privilege, authorization separation, and object classification. The bitemporal database will log account activities and process time indices, while authorized system users access and query any information. It can make data integrity, access control, and tracing accomplish certain level of security. It also can make effective audit and monitor on misbehaviors of employees. Traditional certificate management systems use normal databases. In these systems, the storage and maintenance of certificates are implemented by replacing old certificates with new ones. This makes data audit a tough task. Managing authorization policies and certificate data adopting bitemporal databases, auditors can check and analyze certificate data, and then find out suspicious data. This study applied the RBAC theory, combining with bitemporal databases, to the complex enterprise environments. We also use certificate authorizing polices bitemporally managing the databases. Our system can detect the usages of enterprise systems and data. The system can also report violations to the auditors. Auditors can thereby properly react. This work focuses on enterprise auditing management of database system under PKI (public key infrastructure) and PMI (privilege management infrastructure). Hopefully, through effective certificate record management, data integrity is ensured. At the same time, legal users can be audited effectively.
author2 Dwen - Ren Tsai
author_facet Dwen - Ren Tsai
Hung-Yi Lee
李虹儀
author Hung-Yi Lee
李虹儀
spellingShingle Hung-Yi Lee
李虹儀
Using a Bitemporal Relation-based Reliable Auditing Mechanism on the Organizational Privilege Accountability
author_sort Hung-Yi Lee
title Using a Bitemporal Relation-based Reliable Auditing Mechanism on the Organizational Privilege Accountability
title_short Using a Bitemporal Relation-based Reliable Auditing Mechanism on the Organizational Privilege Accountability
title_full Using a Bitemporal Relation-based Reliable Auditing Mechanism on the Organizational Privilege Accountability
title_fullStr Using a Bitemporal Relation-based Reliable Auditing Mechanism on the Organizational Privilege Accountability
title_full_unstemmed Using a Bitemporal Relation-based Reliable Auditing Mechanism on the Organizational Privilege Accountability
title_sort using a bitemporal relation-based reliable auditing mechanism on the organizational privilege accountability
publishDate 2004
url http://ndltd.ncl.edu.tw/handle/43902745677140863588
work_keys_str_mv AT hungyilee usingabitemporalrelationbasedreliableauditingmechanismontheorganizationalprivilegeaccountability
AT lǐhóngyí usingabitemporalrelationbasedreliableauditingmechanismontheorganizationalprivilegeaccountability
AT hungyilee shǐyòngshuāngshíjiānguānxìzhīkěkàojīhéjīzhìyīngyòngyúzǔzhīzhōngzhíquánzérènkěguīshǔxìng
AT lǐhóngyí shǐyòngshuāngshíjiānguānxìzhīkěkàojīhéjīzhìyīngyòngyúzǔzhīzhōngzhíquánzérènkěguīshǔxìng
_version_ 1717736969870508032