By Topic

An Extended Role-based Access Controls Model: Temporal, Spatial, Workflowed and Attributed Role-based Access Controls Model

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Guoliang Tang ; Sch. of Inf. Technol., Henan Univ. of Traditional Chinese Med., Zhengzhou, China ; Feng Yang ; Zhiyong Zhang ; Jiexin Pu

According to the respective advantages of RBAC model and UCON model, Subject, Object, Role, Permission and Operation are all regarded as the instance of the class with attributes and methods on object-oriented programming, role-based access control model with the constraints of Temporal, spatial, attribute and workflow (TSAW-RBAC model) is proposed, the Observer Entity is introduced that assigns the operations to the Object according to the attributes of the Object and the Supervisor Entity is introduced that assigns the roles to the user according to the attributes of the user. It Can implement access control based on temporal and spatial constraints in the distributed computing environment, can implement user's role-assign automatically based on Subject's attributes and object's attributes, can implement workflow based on the constraints of Subject's attributes and object's attributes, can implement the Digital Rights Management (DRM) and Trust Management.

Published in:

Genetic and Evolutionary Computing (ICGEC), 2010 Fourth International Conference on

Date of Conference:

13-15 Dec. 2010