{"title":"改进RBAC模型的研究与应用","authors":"Pang Chun-jiang","doi":"10.1109/ICIII.2008.240","DOIUrl":null,"url":null,"abstract":"Core-RBAC model is a demand-oriented enterprise security access control strategy. In the paper, on the basis of Core-RBAC model, roles set and permissions set were fractionized. The refinement core-RBAC model was more fine permissions setting. In accordance with the actual needs of administrators, each one can definitely install to the functions and permissions in the five dimensions which are data cycle, data object, data sort, operation function, operation level. Moreover, the refinement RBAC model was used in the development of permission management module of the power supply ERP (enterprise resource planning) system, depth and flexibility to control the function and the visited data content, and achieve accurate management purposes.","PeriodicalId":185591,"journal":{"name":"2008 International Conference on Information Management, Innovation Management and Industrial Engineering","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research and Application of Improved RBAC Model\",\"authors\":\"Pang Chun-jiang\",\"doi\":\"10.1109/ICIII.2008.240\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Core-RBAC model is a demand-oriented enterprise security access control strategy. In the paper, on the basis of Core-RBAC model, roles set and permissions set were fractionized. The refinement core-RBAC model was more fine permissions setting. In accordance with the actual needs of administrators, each one can definitely install to the functions and permissions in the five dimensions which are data cycle, data object, data sort, operation function, operation level. Moreover, the refinement RBAC model was used in the development of permission management module of the power supply ERP (enterprise resource planning) system, depth and flexibility to control the function and the visited data content, and achieve accurate management purposes.\",\"PeriodicalId\":185591,\"journal\":{\"name\":\"2008 International Conference on Information Management, Innovation Management and Industrial Engineering\",\"volume\":\"57 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Conference on Information Management, Innovation Management and Industrial Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIII.2008.240\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Information Management, Innovation Management and Industrial Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIII.2008.240","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Core-RBAC model is a demand-oriented enterprise security access control strategy. In the paper, on the basis of Core-RBAC model, roles set and permissions set were fractionized. The refinement core-RBAC model was more fine permissions setting. In accordance with the actual needs of administrators, each one can definitely install to the functions and permissions in the five dimensions which are data cycle, data object, data sort, operation function, operation level. Moreover, the refinement RBAC model was used in the development of permission management module of the power supply ERP (enterprise resource planning) system, depth and flexibility to control the function and the visited data content, and achieve accurate management purposes.