{"title":"基于角色的USB加密卡访问控制方案设计","authors":"Houtao Ji, Xiaoqian Guan, Yuan-bin Wang","doi":"10.1109/IHMSC.2013.12","DOIUrl":null,"url":null,"abstract":"Role-Based Access Control (RBAC) is a kind of access control mechanism which is convenient and secure. To protect the resources of USB cryptographic card, a RBAC method is purposed and implemented in this paper, which meets the need of access control, least privilege, small computation and managed easily. Analyses the need of the USB cryptographic card, compares several main access control models, introduces the characteristic and application advantages of RBAC, finally demonstrates in detail how to apply RBAC in USB cryptographic card.","PeriodicalId":222375,"journal":{"name":"2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics","volume":"342 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Design of Role-Based Access Control Scheme in USB Cryptographic Card\",\"authors\":\"Houtao Ji, Xiaoqian Guan, Yuan-bin Wang\",\"doi\":\"10.1109/IHMSC.2013.12\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Role-Based Access Control (RBAC) is a kind of access control mechanism which is convenient and secure. To protect the resources of USB cryptographic card, a RBAC method is purposed and implemented in this paper, which meets the need of access control, least privilege, small computation and managed easily. Analyses the need of the USB cryptographic card, compares several main access control models, introduces the characteristic and application advantages of RBAC, finally demonstrates in detail how to apply RBAC in USB cryptographic card.\",\"PeriodicalId\":222375,\"journal\":{\"name\":\"2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics\",\"volume\":\"342 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-08-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IHMSC.2013.12\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IHMSC.2013.12","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Design of Role-Based Access Control Scheme in USB Cryptographic Card
Role-Based Access Control (RBAC) is a kind of access control mechanism which is convenient and secure. To protect the resources of USB cryptographic card, a RBAC method is purposed and implemented in this paper, which meets the need of access control, least privilege, small computation and managed easily. Analyses the need of the USB cryptographic card, compares several main access control models, introduces the characteristic and application advantages of RBAC, finally demonstrates in detail how to apply RBAC in USB cryptographic card.