By Topic

Platform for Access Control Management in Information System Based on Extended RBAC Model

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Aneta Poniszewska-Maranda ; Inst. of Inf. Technol., Tech. Univ. of Lodz, Lodz, Poland

The development and complexity of functionalities of the information systems are the reasons why the conception and realization of the system, being strategic for the enterprise, belong to professional activities. The protection of the data in the information systems against the improper disclosure or modification is an important requirement of each system. Nowadays the information systems of the enterprises are more and more open, more information is easy accessible for the users, so it is important to better protect the confidential information. The paper describes the platform for access control management in field of information systems that can be used by the system developers and security administrators to support their job in assuring the security of data stored and processed in an information system and assuring the global coherence of access control rules in the whole system. The proposed platform is realized using some information technologies but the main concepts is connected with the access control model based on the role approach that reflects in the better way the company's organization on the access control level. The created platform was based on the extended RBACmodel that provides the developers more flexibility and complex vie of security organization.

Published in:

Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), 2010 12th International Symposium on

Date of Conference:

23-26 Sept. 2010