Abstract
Access control comprises different kinds of access control policies. This paper proposed an RBAC-based access control integration framework to achieve and manage various access control policies during legacy system integration. Permission is defined as tasks, and tasks are extracted and organized as tree structure for each system. Then, a global task tree and an integrated policy library are generated for the integrated system to reorganize access control policies of different legacy systems. Additionally rules for authorization management are given to carry out further authorization. A case study is demonstrated to depict the proposed framework is a feasible and flexible solution for access control integration.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bennett, K.H.: Legacy System: Coping with Success. IEEE Software 12(1), 19–23 (1995)
Antonio, A.: Migrating to Role Based Access Control (2006), http://www.altametric.com/journal/EntCasePub.pdf
Bertino, E.: RBAC models–concepts and trends. Computers & Security 22(6), 511–514 (2003)
Chen, F., Li, S., Yang, H.: Enforcing Role-Based Access Controls in Software Systems with an Agent Based Service Oriented Approach. In: Proceedings of the 2007 IEEE International Conference on Networking, Sensing and Control, London, pp. 15–17 (2007)
Ke, G., Ling, J., Hao, Y., Liao, H., Yang, Z.: Research and implementation of file protection system based on improved role-based access control. In: International Symposium on Computational Intelligence and Design, Changsha, pp. 242–245 (2009)
Bozzon, A., Iofciu, T., Nejdl, W., Taddeo, A.V., Tonnies, S.: Role Based Access Control for the interaction with Search Engines. In: Proceedings of the 1st International Workshop on Collaborative Open Environments for Project-Centered Learning, Greece, pp. 24–33 (2007)
Li, N., Mao, Z.: Administration in Role-Based Access Control. In: 2nd ACM Symposium on Information, Computer and Communications Security, Singapore, pp. 127–138 (2007)
Dekker, M.A.C., Crampton, J., Etalle, S.: RBAC Administration in Distributed Systems. In: Proceedings of ACM Symposium on Access Control Models and Technologies, Estes Park, pp. 93–101 (2008)
Li, X., Feng, D., Xu, Z.: A Generic Access Control Administration Model. Journal of Computer Research and Development 44(6), 947–957 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Guo, H., Lu, G., Wang, Y., Li, H., Chen, X. (2010). RBAC-Based Access Control Integration Framework for Legacy System. In: Wang, F.L., Gong, Z., Luo, X., Lei, J. (eds) Web Information Systems and Mining. WISM 2010. Lecture Notes in Computer Science, vol 6318. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16515-3_25
Download citation
DOI: https://doi.org/10.1007/978-3-642-16515-3_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16514-6
Online ISBN: 978-3-642-16515-3
eBook Packages: Computer ScienceComputer Science (R0)