Trust Based Authorization and Access Control

Authorization is very important for access control, which can prevent the illegal operations of users and protect the system security. We firstly introduce a trust and context based access control (TCAC) model. Then we apply TCAC to the national college entrance system (CES), and express the basic e...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Feng Fujun, Li Junshan
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Authorization is very important for access control, which can prevent the illegal operations of users and protect the system security. We firstly introduce a trust and context based access control (TCAC) model. Then we apply TCAC to the national college entrance system (CES), and express the basic elements of TCAC in CES. Finally, we discuss the authorization rules of different subjects with different roles. An algorithm is proposed to detect conflict rules. Moreover, we prove the completeness of these authorization rules.
DOI:10.1109/IFITA.2009.240