Skip to main content

RBAC-Based Access Control Integration Framework for Legacy System

  • Conference paper
Web Information Systems and Mining (WISM 2010)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6318))

Included in the following conference series:

Abstract

Access control comprises different kinds of access control policies. This paper proposed an RBAC-based access control integration framework to achieve and manage various access control policies during legacy system integration. Permission is defined as tasks, and tasks are extracted and organized as tree structure for each system. Then, a global task tree and an integrated policy library are generated for the integrated system to reorganize access control policies of different legacy systems. Additionally rules for authorization management are given to carry out further authorization. A case study is demonstrated to depict the proposed framework is a feasible and flexible solution for access control integration.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Bennett, K.H.: Legacy System: Coping with Success. IEEE Software 12(1), 19–23 (1995)

    Article  Google Scholar 

  2. Antonio, A.: Migrating to Role Based Access Control (2006), http://www.altametric.com/journal/EntCasePub.pdf

  3. Bertino, E.: RBAC models–concepts and trends. Computers & Security 22(6), 511–514 (2003)

    Article  Google Scholar 

  4. Chen, F., Li, S., Yang, H.: Enforcing Role-Based Access Controls in Software Systems with an Agent Based Service Oriented Approach. In: Proceedings of the 2007 IEEE International Conference on Networking, Sensing and Control, London, pp. 15–17 (2007)

    Google Scholar 

  5. Ke, G., Ling, J., Hao, Y., Liao, H., Yang, Z.: Research and implementation of file protection system based on improved role-based access control. In: International Symposium on Computational Intelligence and Design, Changsha, pp. 242–245 (2009)

    Google Scholar 

  6. Bozzon, A., Iofciu, T., Nejdl, W., Taddeo, A.V., Tonnies, S.: Role Based Access Control for the interaction with Search Engines. In: Proceedings of the 1st International Workshop on Collaborative Open Environments for Project-Centered Learning, Greece, pp. 24–33 (2007)

    Google Scholar 

  7. Li, N., Mao, Z.: Administration in Role-Based Access Control. In: 2nd ACM Symposium on Information, Computer and Communications Security, Singapore, pp. 127–138 (2007)

    Google Scholar 

  8. Dekker, M.A.C., Crampton, J., Etalle, S.: RBAC Administration in Distributed Systems. In: Proceedings of ACM Symposium on Access Control Models and Technologies, Estes Park, pp. 93–101 (2008)

    Google Scholar 

  9. Li, X., Feng, D., Xu, Z.: A Generic Access Control Administration Model. Journal of Computer Research and Development 44(6), 947–957 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Guo, H., Lu, G., Wang, Y., Li, H., Chen, X. (2010). RBAC-Based Access Control Integration Framework for Legacy System. In: Wang, F.L., Gong, Z., Luo, X., Lei, J. (eds) Web Information Systems and Mining. WISM 2010. Lecture Notes in Computer Science, vol 6318. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16515-3_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16515-3_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16514-6

  • Online ISBN: 978-3-642-16515-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics