A Study of Usage Control Model in Role-Based Access Control System
碩士 === 中原大學 === 資訊工程研究所 === 93 === In traditional RBAC systems, a user’s access rights will be checked and authorized before system resources can be used. But this is not enough in some situations, so that the concepts of usage control were introduced. Usage control allows three kinds of authorizati...
Main Authors: | Tseng-Wei Chan, 曾瑋展 |
---|---|
Other Authors: | Chung-Shyan Liu |
Format: | Others |
Language: | zh-TW |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/sc2rd9 |
Similar Items
-
A Study on The Implementation of The Role-Based Access Control Model
by: Tseng, Yu-Jou, et al.
Published: (1998) -
A Study of Role-Based Access Control for Web Database
by: CHAN-SHENG CHUANG, et al.
Published: (2008) -
Design and Implementation of Role-Based Access Control on the Web
by: Jau-Hao Tseng, et al.
Published: (2000) -
Context and Role-based Access Control Model for Digital Content
by: Yi-Wei Chen, et al.
Published: (2009) -
Distributed Task-Role Based Access Control
by: Tzu-Wei Huang, et al.
Published: (2004)