A Study of Team in Attribute Role-Based Access Control System
碩士 === 中原大學 === 資訊工程研究所 === 104 === Access control is an important part of information security. It decides how a user can legally obtain permission to access resources in appropriate situations. Because more information systems are deployed in a models enterprise, it become more complicated to set...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2016
|
Online Access: | http://ndltd.ncl.edu.tw/handle/54408034821706019250 |
id |
ndltd-TW-104CYCU5392002 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-104CYCU53920022017-10-29T04:34:39Z http://ndltd.ncl.edu.tw/handle/54408034821706019250 A Study of Team in Attribute Role-Based Access Control System 屬性型以角色為基底的權限控管於團隊群組之研究與應用 KANG-CHIH HSU 徐綱志 碩士 中原大學 資訊工程研究所 104 Access control is an important part of information security. It decides how a user can legally obtain permission to access resources in appropriate situations. Because more information systems are deployed in a models enterprise, it become more complicated to set permissions. For example we may need new methods to set the permissions of a team. Since a team has specific targets and is composed of people, it may be difficult to use currently available access control methods. Since a team is composed of the team members and has target attributes, we proposed a new permissions model based on these team characteristics. The model, called Team RBAC, is based on Attribute RBAC. A user can define the team''s targets, the team member’s attributes and limitations, then the system can decide whether a team can be composed. The team will be given permissions if it is composed. Team RBAC has the advantages that it allows a more convenient management and can be more flexibly applied, because in Team RBAC, the attributes of a team can be dynamically modified. Two examples were presented to demonstrate possible applications of Team RBAC, one is an online game play treasure team composition, and the other is ISO audit team composition for a company. We also implemented a prototype system to show how an online gaming system can use Team RBAC model. CHUNG-SHYAN LIU 留忠賢 2016 學位論文 ; thesis 53 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 中原大學 === 資訊工程研究所 === 104 === Access control is an important part of information security. It decides how a user can legally
obtain permission to access resources in appropriate situations. Because more information
systems are deployed in a models enterprise, it become more complicated to set permissions. For
example we may need new methods to set the permissions of a team. Since a team has specific
targets and is composed of people, it may be difficult to use currently available access control
methods.
Since a team is composed of the team members and has target attributes, we proposed a new
permissions model based on these team characteristics. The model, called Team RBAC, is based
on Attribute RBAC. A user can define the team''s targets, the team member’s attributes and
limitations, then the system can decide whether a team can be composed. The team will be given
permissions if it is composed. Team RBAC has the advantages that it allows a more convenient
management and can be more flexibly applied, because in Team RBAC, the attributes of a team
can be dynamically modified.
Two examples were presented to demonstrate possible applications of Team RBAC, one is
an online game play treasure team composition, and the other is ISO audit team composition for
a company. We also implemented a prototype system to show how an online gaming system can
use Team RBAC model.
|
author2 |
CHUNG-SHYAN LIU |
author_facet |
CHUNG-SHYAN LIU KANG-CHIH HSU 徐綱志 |
author |
KANG-CHIH HSU 徐綱志 |
spellingShingle |
KANG-CHIH HSU 徐綱志 A Study of Team in Attribute Role-Based Access Control System |
author_sort |
KANG-CHIH HSU |
title |
A Study of Team in Attribute Role-Based Access Control System |
title_short |
A Study of Team in Attribute Role-Based Access Control System |
title_full |
A Study of Team in Attribute Role-Based Access Control System |
title_fullStr |
A Study of Team in Attribute Role-Based Access Control System |
title_full_unstemmed |
A Study of Team in Attribute Role-Based Access Control System |
title_sort |
study of team in attribute role-based access control system |
publishDate |
2016 |
url |
http://ndltd.ncl.edu.tw/handle/54408034821706019250 |
work_keys_str_mv |
AT kangchihhsu astudyofteaminattributerolebasedaccesscontrolsystem AT xúgāngzhì astudyofteaminattributerolebasedaccesscontrolsystem AT kangchihhsu shǔxìngxíngyǐjiǎosèwèijīdǐdequánxiànkòngguǎnyútuánduìqúnzǔzhīyánjiūyǔyīngyòng AT xúgāngzhì shǔxìngxíngyǐjiǎosèwèijīdǐdequánxiànkòngguǎnyútuánduìqúnzǔzhīyánjiūyǔyīngyòng AT kangchihhsu studyofteaminattributerolebasedaccesscontrolsystem AT xúgāngzhì studyofteaminattributerolebasedaccesscontrolsystem |
_version_ |
1718557771273601024 |