Abstract
For the Computer Supported Collaborative Design (CSCD) environment’s groups, dynamics and distribution characteristics, the paper proposes a Task & Role-Based access control model (T & RBAC) and makes the informal definition of the model. The T & RBAC model is based on the T-RBAC model, and extends the definition of the Users, Roles, Tasks, Permissions and the other factors. In the T&RBAC model, Roles are classified into two classes : job position and business role. As a passive role, permissions are preasigned to the job function Role. By the other way, the business role is assigned to the task in the business process, and the permissions are actived by the context of the task’s excuted status, so that the paper realizes the active and passive access control. Finally, we applied the T&RBAC model in the CSCD system and validated the model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References:
Haibin, Y., Yun, Z.: Collaborative manufacturing. Tsinghua University Press, Beijing (2004)
Shen, W., Hao, Q., Li, W.: Computer Supported Collaborative Design: Retrospective and perspective. Computers in Industry 59(9), 855–862 (2008)
Patel, A.: Security management for OSI networks. Computer Communications 17(7), 544–553 (1994)
Stergiou, T., Leeson, M.S., Green, R.J.: An alternative architectural framework to the OSI security model. Computers and Security 23(23), 137–153 (2004)
Defense, AD0.TnlstedComPuterSystemEvaluationCriteria (August 15, 1983)
Pfleger, C.P.: Security in Computing, 2nd edn. Prentice-Hall International Inc., Englewood Cliffs (1997)
Joshi, J., Aref, W., Ghafoor, A., Spafford, E.: Security model for web-based applications. Communications ACM 44 (2) (2001)
Amoroso, E.G.: Fundamental of Computer Security Technology. PTR, Prentice-Hall, Englewoods Cliffs (1994)
Ferraiolo, D.F., Gilbert, D.M., Lynch, N.: An Examination of Federal and Commercial Access Control Policy Needs. In: Proc. NIST-NCSC National Computer Security Conf., Nat’l Inst. Standards and Technology, Gaithersburg, Md., pp. 107–116 (1993)
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer (1996)
Sejong, O.: Seog Park. Task-role-based access control model, Information Systems 28, 533–562 (2003)
Yang, L., Choi, Y., Choi, M., Zhao, X.: FWAM: A Flexible Workflow Authorization Model using Extended RBAC
Daoju, X., Chao, L., Xiaosu, C.: The Security model of CSCW system based on RBAC. J. Huazhong Univ. of Sci. & Tech. (Nature Science Edition) 32(5) (May 2004)
Cheng-kai, L.I., Yong-zhao, Z.H.A.N., Bing, M.A.O., Li, X.I.E.: A Role-Based Access Control Model for CSCW Systems. Journal of Software 11(7), 931–937 (2000)
Jun, Z., Yong, T.: Study of the Role and Task-based Access Control Technology for CSCW System. Computer Science 37(7) (2010)
Ji-Bo, D., Fan, H.: Task-Based Access Control Model. Journal of Software 14(1) (2003)
Fan, H., Xiaofei, Z.: Task-based access control model and its implemention, Huazhong. J. Univ. of Sci. & Tech. (Nature Science Edition) 30(1) (January 2002)
Quan-bing, C., Hui-jin, W.: An improved access control model based on Task-Role. Journal of Jinan University (Natural Science) 31(1) (2010)
Hartley, J.: Concurrent Engineering, Cambridge. Productivity Press, Mass. (1992)
Zongkai, L.: Collaborative design will design and CAD technology-induced changes. Journal of Software, Supplement 9, 126–130 (1998)
Myers, B.A.: A brief history of human-computer interaction technology interactions. 5(2), 44–54 (1998)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Fei, A., Ping, z. (2014). An Improved Access Control Model for the CSCD Environment. In: Leung, V., Chen, M., Wan, J., Zhang, Y. (eds) Testbeds and Research Infrastructure: Development of Networks and Communities. TridentCom 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 137. Springer, Cham. https://doi.org/10.1007/978-3-319-13326-3_46
Download citation
DOI: https://doi.org/10.1007/978-3-319-13326-3_46
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13325-6
Online ISBN: 978-3-319-13326-3
eBook Packages: Computer ScienceComputer Science (R0)