By Topic

Application of role-based access control in information system

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)

In a practical system of commerce sites, we not only need to focus on their own functional requirements, but also need to consider many other security requirements. Security is a very important aspect. Access control occupies a vital role in a website system. To solve the problem of access control is to solve a majority of the security problem. The role-based access control model separated users and permission with logically, meanwhile it reduces the complexity of management, and reduces administrative overhead and management complexity. The role-based access control model will play an important role in the increasing size of business information management system. We can use the role-based access control model to solve the problem of access control, and put it into the information system.

Published in:

Wavelet Active Media Technology and Information Processing (ICWAMTIP), 2012 International Conference on

Date of Conference:

17-19 Dec. 2012