The Application of Information Security Authorization Control for Organization based on Ontology

碩士 === 國防大學管理學院 === 資訊管理學系 === 97 === Users can be categorized into different groups by role. But improper categorizing will cause critical conflict and unsafe results. The problems of role conflicts among multiple systems within and among organizations are existence and emergency in this network se...

Full description

Bibliographic Details
Main Authors: Shih-Wei Lin, 林仕偉
Other Authors: Fong-Hao Liu
Format: Others
Language:zh-TW
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/43744413009784676106
Description
Summary:碩士 === 國防大學管理學院 === 資訊管理學系 === 97 === Users can be categorized into different groups by role. But improper categorizing will cause critical conflict and unsafe results. The problems of role conflicts among multiple systems within and among organizations are existence and emergency in this network service area. The tranditional RBAC model (Role Based Access Control) is employed by many existed systems like single sign on. But its defects can cause the use and security problems. This research bases on the ontological and systematic model to expose and solve the access and security problems for all systems. This research proposed an Information Security Authorize Ontology (ISAO) integrated with constrain rules of system security and an inference engine that can detect role conflicts for multiple systems environment.