By Topic

Research of RBAC based threaded object

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Jian-Jun Wang ; Inf. Sci. & Technol. Dept., HuNan First Normal Univ., Changsha, China ; Hong Deng

Security policy was implemented by using a module in security kernel, and it was not benefit to change of security policy. Used threaded software architecture in security kernel of information security toolkit, used object technology to implement every sub-system, and objected the application which accessing information in security toolkit. Security kernel can not depend to exterior application, and has independence among the inside objects, convenient function to expand and maintain. Security kernel implement access control mechanisms which use RBAC as an object, it ensure the security of both the objected application and the interior information of toolkit.

Published in:

Apperceiving Computing and Intelligence Analysis, 2009. ICACIA 2009. International Conference on

Date of Conference:

23-25 Oct. 2009