Trust Based Authorization and Access Control
Authorization is very important for access control, which can prevent the illegal operations of users and protect the system security. We firstly introduce a trust and context based access control (TCAC) model. Then we apply TCAC to the national college entrance system (CES), and express the basic e...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Authorization is very important for access control, which can prevent the illegal operations of users and protect the system security. We firstly introduce a trust and context based access control (TCAC) model. Then we apply TCAC to the national college entrance system (CES), and express the basic elements of TCAC in CES. Finally, we discuss the authorization rules of different subjects with different roles. An algorithm is proposed to detect conflict rules. Moreover, we prove the completeness of these authorization rules. |
---|---|
DOI: | 10.1109/IFITA.2009.240 |