Abstract
It is a vital service process for equipment maintenance to ensure regular operation. The equipment transitions from inside of the warranty period to outside of the warranty period and the staff involved in the maintenance service will transform from manufacturer personnel to a mixed team of user teams and third-party companies. The permissions will change with their responsibilities in the equipment maintenance service system. In this paper, we take the maintenance service system of shield tunneling machine equipment as a case, which design the personnel structure of the mixed maintenance team and establish an authorization mechanism to support the multi-team work process of equipment maintenance. We design a user group-based hierarchical control strategy that combines the equipment maintenance service system’s resource structure. At the end of this paper, though the simulation-based on Colored Petri Net CPN Tools, we verify the correctness and effectiveness of the permission dispatching mechanism.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Sandhu, R., Coyne, E.J., Feinstein, H.L., et al.: Role-based access control models. IEEE Comput. 29(2), 38–47 (1996)
Zhang, X., Li, Q., Yang, Z.: Design and implementation of permission management of aircraft maintenance support information system. Comput. Appl. 34(S1), 70–73 (2014)
Deng, M., Liu, T.: Design and implementation of user and permission management functions of rail transit integrated monitoring system. Mechatron. Eng. Technol. 49(5),165–167, 213 (2020)
Sheng, K., Liu, J., Liu, X.: Organizational structure based access control model. In: Proceedings of the 3rd international conference on Information security (InfoSecu 2004), pp. 210–215. Association for Computing Machinery, New York (2004)
Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: a temporal role-based access control model. ACM Trans. Inf. Syst. Secur. 4(3), 191–233 (2001)
Wang, S., Yang, Y., Xia, T., Zhang, W.: A role and node based access control model for industrial control network. In: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018), pp. 89–94. Association for Computing Machinery, New York (2018)
Aftab, M.U., Qin, M., Zakria, S.F.Q., Javed, A., Nie, X.: Role-based ABAC model for implementing least privileges. In: Proceedings of the 2019 8th International Conference on Software and Computer Applications (ICSCA 2019), pp. 467–471. Association for Computing Machinery, New York (2019)
Acknowledgments
This paper is supported by the National Key Research and Development Program of China (2018YFB1701400), the Natural Science Foundation of China (U1636213, 61672508).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Liu, Y., Wu, W., Bo, W., Han, C., Zhang, Q., Zhang, C. (2021). Permission Dispatching Mechanism Inside and Outside of the Warranty Period for Equipment Maintenance Service System. In: Zu, Q., Tang, Y., Mladenović, V. (eds) Human Centered Computing. HCC 2020. Lecture Notes in Computer Science(), vol 12634. Springer, Cham. https://doi.org/10.1007/978-3-030-70626-5_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-70626-5_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-70625-8
Online ISBN: 978-3-030-70626-5
eBook Packages: Computer ScienceComputer Science (R0)