Skip to main content

An Improved Access Control Model for the CSCD Environment

  • Conference paper
  • First Online:
Testbeds and Research Infrastructure: Development of Networks and Communities (TridentCom 2014)

Abstract

For the Computer Supported Collaborative Design (CSCD) environment’s groups, dynamics and distribution characteristics, the paper proposes a Task & Role-Based access control model (T & RBAC) and makes the informal definition of the model. The T & RBAC model is based on the T-RBAC model, and extends the definition of the Users, Roles, Tasks, Permissions and the other factors. In the T&RBAC model, Roles are classified into two classes : job position and business role. As a passive role, permissions are preasigned to the job function Role. By the other way, the business role is assigned to the task in the business process, and the permissions are actived by the context of the task’s excuted status, so that the paper realizes the active and passive access control. Finally, we applied the T&RBAC model in the CSCD system and validated the model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References:

  1. Haibin, Y., Yun, Z.: Collaborative manufacturing. Tsinghua University Press, Beijing (2004)

    Google Scholar 

  2. Shen, W., Hao, Q., Li, W.: Computer Supported Collaborative Design: Retrospective and perspective. Computers in Industry 59(9), 855–862 (2008)

    Article  Google Scholar 

  3. Patel, A.: Security management for OSI networks. Computer Communications 17(7), 544–553 (1994)

    Article  Google Scholar 

  4. Stergiou, T., Leeson, M.S., Green, R.J.: An alternative architectural framework to the OSI security model. Computers and Security 23(23), 137–153 (2004)

    Article  Google Scholar 

  5. Defense, AD0.TnlstedComPuterSystemEvaluationCriteria (August 15, 1983)

    Google Scholar 

  6. Pfleger, C.P.: Security in Computing, 2nd edn. Prentice-Hall International Inc., Englewood Cliffs (1997)

    Google Scholar 

  7. Joshi, J., Aref, W., Ghafoor, A., Spafford, E.: Security model for web-based applications. Communications ACM 44 (2) (2001)

    Google Scholar 

  8. Amoroso, E.G.: Fundamental of Computer Security Technology. PTR, Prentice-Hall, Englewoods Cliffs (1994)

    Google Scholar 

  9. Ferraiolo, D.F., Gilbert, D.M., Lynch, N.: An Examination of Federal and Commercial Access Control Policy Needs. In: Proc. NIST-NCSC National Computer Security Conf., Nat’l Inst. Standards and Technology, Gaithersburg, Md., pp. 107–116 (1993)

    Google Scholar 

  10. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer (1996)

    Google Scholar 

  11. Sejong, O.: Seog Park. Task-role-based access control model, Information Systems 28, 533–562 (2003)

    MATH  Google Scholar 

  12. Yang, L., Choi, Y., Choi, M., Zhao, X.: FWAM: A Flexible Workflow Authorization Model using Extended RBAC

    Google Scholar 

  13. Daoju, X., Chao, L., Xiaosu, C.: The Security model of CSCW system based on RBAC. J. Huazhong Univ. of Sci. & Tech. (Nature Science Edition) 32(5) (May 2004)

    Google Scholar 

  14. Cheng-kai, L.I., Yong-zhao, Z.H.A.N., Bing, M.A.O., Li, X.I.E.: A Role-Based Access Control Model for CSCW Systems. Journal of Software 11(7), 931–937 (2000)

    Google Scholar 

  15. Jun, Z., Yong, T.: Study of the Role and Task-based Access Control Technology for CSCW System. Computer Science 37(7) (2010)

    Google Scholar 

  16. Ji-Bo, D., Fan, H.: Task-Based Access Control Model. Journal of Software 14(1) (2003)

    Google Scholar 

  17. Fan, H., Xiaofei, Z.: Task-based access control model and its implemention, Huazhong. J. Univ. of Sci. & Tech. (Nature Science Edition) 30(1) (January 2002)

    Google Scholar 

  18. Quan-bing, C., Hui-jin, W.: An improved access control model based on Task-Role. Journal of Jinan University (Natural Science) 31(1) (2010)

    Google Scholar 

  19. Hartley, J.: Concurrent Engineering, Cambridge. Productivity Press, Mass. (1992)

    Google Scholar 

  20. Zongkai, L.: Collaborative design will design and CAD technology-induced changes. Journal of Software, Supplement 9, 126–130 (1998)

    Google Scholar 

  21. Myers, B.A.: A brief history of human-computer interaction technology interactions. 5(2), 44–54 (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ai Fei .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Fei, A., Ping, z. (2014). An Improved Access Control Model for the CSCD Environment. In: Leung, V., Chen, M., Wan, J., Zhang, Y. (eds) Testbeds and Research Infrastructure: Development of Networks and Communities. TridentCom 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 137. Springer, Cham. https://doi.org/10.1007/978-3-319-13326-3_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13326-3_46

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13325-6

  • Online ISBN: 978-3-319-13326-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics