A Study of Team in Attribute Role-Based Access Control System

碩士 === 中原大學 === 資訊工程研究所 === 104 === Access control is an important part of information security. It decides how a user can legally obtain permission to access resources in appropriate situations. Because more information systems are deployed in a models enterprise, it become more complicated to set...

Full description

Bibliographic Details
Main Authors: KANG-CHIH HSU, 徐綱志
Other Authors: CHUNG-SHYAN LIU
Format: Others
Language:zh-TW
Published: 2016
Online Access:http://ndltd.ncl.edu.tw/handle/54408034821706019250
id ndltd-TW-104CYCU5392002
record_format oai_dc
spelling ndltd-TW-104CYCU53920022017-10-29T04:34:39Z http://ndltd.ncl.edu.tw/handle/54408034821706019250 A Study of Team in Attribute Role-Based Access Control System 屬性型以角色為基底的權限控管於團隊群組之研究與應用 KANG-CHIH HSU 徐綱志 碩士 中原大學 資訊工程研究所 104 Access control is an important part of information security. It decides how a user can legally obtain permission to access resources in appropriate situations. Because more information systems are deployed in a models enterprise, it become more complicated to set permissions. For example we may need new methods to set the permissions of a team. Since a team has specific targets and is composed of people, it may be difficult to use currently available access control methods. Since a team is composed of the team members and has target attributes, we proposed a new permissions model based on these team characteristics. The model, called Team RBAC, is based on Attribute RBAC. A user can define the team''s targets, the team member’s attributes and limitations, then the system can decide whether a team can be composed. The team will be given permissions if it is composed. Team RBAC has the advantages that it allows a more convenient management and can be more flexibly applied, because in Team RBAC, the attributes of a team can be dynamically modified. Two examples were presented to demonstrate possible applications of Team RBAC, one is an online game play treasure team composition, and the other is ISO audit team composition for a company. We also implemented a prototype system to show how an online gaming system can use Team RBAC model. CHUNG-SHYAN LIU 留忠賢 2016 學位論文 ; thesis 53 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 中原大學 === 資訊工程研究所 === 104 === Access control is an important part of information security. It decides how a user can legally obtain permission to access resources in appropriate situations. Because more information systems are deployed in a models enterprise, it become more complicated to set permissions. For example we may need new methods to set the permissions of a team. Since a team has specific targets and is composed of people, it may be difficult to use currently available access control methods. Since a team is composed of the team members and has target attributes, we proposed a new permissions model based on these team characteristics. The model, called Team RBAC, is based on Attribute RBAC. A user can define the team''s targets, the team member’s attributes and limitations, then the system can decide whether a team can be composed. The team will be given permissions if it is composed. Team RBAC has the advantages that it allows a more convenient management and can be more flexibly applied, because in Team RBAC, the attributes of a team can be dynamically modified. Two examples were presented to demonstrate possible applications of Team RBAC, one is an online game play treasure team composition, and the other is ISO audit team composition for a company. We also implemented a prototype system to show how an online gaming system can use Team RBAC model.
author2 CHUNG-SHYAN LIU
author_facet CHUNG-SHYAN LIU
KANG-CHIH HSU
徐綱志
author KANG-CHIH HSU
徐綱志
spellingShingle KANG-CHIH HSU
徐綱志
A Study of Team in Attribute Role-Based Access Control System
author_sort KANG-CHIH HSU
title A Study of Team in Attribute Role-Based Access Control System
title_short A Study of Team in Attribute Role-Based Access Control System
title_full A Study of Team in Attribute Role-Based Access Control System
title_fullStr A Study of Team in Attribute Role-Based Access Control System
title_full_unstemmed A Study of Team in Attribute Role-Based Access Control System
title_sort study of team in attribute role-based access control system
publishDate 2016
url http://ndltd.ncl.edu.tw/handle/54408034821706019250
work_keys_str_mv AT kangchihhsu astudyofteaminattributerolebasedaccesscontrolsystem
AT xúgāngzhì astudyofteaminattributerolebasedaccesscontrolsystem
AT kangchihhsu shǔxìngxíngyǐjiǎosèwèijīdǐdequánxiànkòngguǎnyútuánduìqúnzǔzhīyánjiūyǔyīngyòng
AT xúgāngzhì shǔxìngxíngyǐjiǎosèwèijīdǐdequánxiànkòngguǎnyútuánduìqúnzǔzhīyánjiūyǔyīngyòng
AT kangchihhsu studyofteaminattributerolebasedaccesscontrolsystem
AT xúgāngzhì studyofteaminattributerolebasedaccesscontrolsystem
_version_ 1718557771273601024