{"title":"基于RBAC的软件存储库分层访问控制模型","authors":"Cen Pengrui, Wu Lingda, Yang Chao, Yu Ronghuan","doi":"10.1109/ICSESS.2016.7883179","DOIUrl":null,"url":null,"abstract":"Analized the task and general form of the software management; pointed out the shortages of the software repository on security. Also introduced the Role-Based Access Control model(RBAC model) which was introduced into the construction of software repository service by combining with the requirement of security management about software repository. A hierarchical access control model based on RBAC was proposed, and it database of the software repository based on RBAC was designed. The effective application of this model in the process of software management can ensure the convenience of software distribution; and meanwhile it can effectively improve the security of the software packages.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"107 4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A hierarchical Access Control model of software repository based on RBAC\",\"authors\":\"Cen Pengrui, Wu Lingda, Yang Chao, Yu Ronghuan\",\"doi\":\"10.1109/ICSESS.2016.7883179\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Analized the task and general form of the software management; pointed out the shortages of the software repository on security. Also introduced the Role-Based Access Control model(RBAC model) which was introduced into the construction of software repository service by combining with the requirement of security management about software repository. A hierarchical access control model based on RBAC was proposed, and it database of the software repository based on RBAC was designed. The effective application of this model in the process of software management can ensure the convenience of software distribution; and meanwhile it can effectively improve the security of the software packages.\",\"PeriodicalId\":175933,\"journal\":{\"name\":\"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)\",\"volume\":\"107 4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSESS.2016.7883179\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSESS.2016.7883179","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A hierarchical Access Control model of software repository based on RBAC
Analized the task and general form of the software management; pointed out the shortages of the software repository on security. Also introduced the Role-Based Access Control model(RBAC model) which was introduced into the construction of software repository service by combining with the requirement of security management about software repository. A hierarchical access control model based on RBAC was proposed, and it database of the software repository based on RBAC was designed. The effective application of this model in the process of software management can ensure the convenience of software distribution; and meanwhile it can effectively improve the security of the software packages.