The Application of Information Security Authorization Control for Organization based on Ontology
碩士 === 國防大學管理學院 === 資訊管理學系 === 97 === Users can be categorized into different groups by role. But improper categorizing will cause critical conflict and unsafe results. The problems of role conflicts among multiple systems within and among organizations are existence and emergency in this network se...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/43744413009784676106 |
Summary: | 碩士 === 國防大學管理學院 === 資訊管理學系 === 97 === Users can be categorized into different groups by role. But improper categorizing will cause critical conflict and unsafe results. The problems of role conflicts among multiple systems within and among organizations are existence and emergency in this network service area. The tranditional RBAC model (Role Based Access Control) is employed by many existed systems like single sign on. But its defects can cause the use and security problems. This research bases on the ontological and systematic model to expose and solve the access and security problems for all systems. This research proposed an Information Security Authorize Ontology (ISAO) integrated with constrain rules of system security and an inference engine that can detect role conflicts for multiple systems environment.
|
---|