Browse > Article

A Study on Role-Based Access Control Modeling in Public Key Infrastructure  

Bang, Geuk-In (조선대학교 컴퓨터공학과)
Lee, Joon (조선대학교 컴퓨터공학과)
Abstract
According as practical use of server system is generalized in multimedia and internet environment, the security of all data that is stored to system is actuality that security mechanism of high level such as competence grant or access control is required. Also, standardization of informations that is stored in system in scattered environment protection technology of more complicated system by absence of done schema, non-systemicity etc. Therefore in this paper. General access control way explained basic modeling because enough investigate and analyze general access control way. And assigning role about each modules separating module of RBAC(Role-Based Access Control) modeling, existent access control modeling and RBAC modeling using mixing new access control modeling present.
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Marie A. Wright, 'An Overview of PKI', Computers & Security, Vol. 15, Issue 4, pp.515-516, 1999
2 Edward C. Cheng, 'An object-oriented organizational model to support dynamic role-based access control in electronic commerce', Decision Support Systems, Vol. 29, Issue 4, pp.362-363, 2000
3 Rayford B. Vaughn, Ronda Henning and Kevin Fox, 'An empirical study of industrial security-engineering practices', Journal of Systems and Software, Vol. 61, Issue 3, pp.227, 2001
4 Reinhardt A. Botha and Jan H. P. Eloff, 'Access Control in Document-centric Workflow Systems An Agent-based Approach', Computers & Security, Vol. 20, Issue 6, pp.529-530, 2001
5 Jing-Jang, Kou-Chen and Duen-Ren, 'Access control with role attribute certificates', Computer Standards & Interfaces, Vol. 22, pp.47-48, 2000
6 Sharman Lichtenstein, 'Information Security Design Principles for Adaptive Organizations', Computer Audit Update, Issue 6, pp.8-9, 1996
7 Chu-Hsing Lin, 'Dynamic key management schemes for access control in a hierarchy', Computer Communications, Vol. 20, Issue 15, pp.338, 2000   DOI   ScienceOn
8 L. Labuschagne and J. H. P. Eloff, 'Improved system-access control using complementary technologies', Computers & Security, Vol. 16, Issue 6, pp.545-547, 1997
9 정원혁, "Microsoft SQL Server", 대림출판사, pp.480-492, 2001
10 Ahmed Patel, 'Access control mechanisms in digital library services', Computer Standards & Interfaces, Vol. 23, Issue 1, pp.21-22, 2001