An Access Control Model for the Adhocracy Organization Using RBAC(Special Section on Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
Access control involves a check to see if a user has an access right to a resource and then a decision is made as to whether his/her access to the resource is to be allowed or denied. Typical access control models are the Discretionary Access Control Model, the Mandatory Access Control Model, and the Role-Based Access Control Model. Today, the Role-Based Access Control Model has become popular and is recognized as an effective method. However, until now, the Role-Based Access Control Model was adequate only for bureaucracy organizations, in which some roles are standardized and organizational hierarchy is stable. Team-Based Access Control models that were designed for team-based organizations have been proposed, but they do not reflect some features of an adhocracy organization, which are organic, temporary, not standardized, changeable, and obscure in terms of hierarchical relationship, such as a Task Force Team in the company. This study shows the characteristics of an adhocracy organization that differ from the existing bureaucracy organization, and then shows why existing access control models have caused some problems. Finally, a revised Role-Based Access Control model is proposed to solve those problems and is analyzed according to main evaluation standards.
- 2003-01-01
著者
-
PARK Seog
Dept. of Computer Science, Sogang University
-
SHIM Won
Dept. of Computer Science, Sogang University
-
Park Seog
Dept. Of Computer Science Sogang University
-
Shim Won
Dept. Of Computer Science Sogang University
-
Park S
Dept. Of Computer Science Sogang University
関連論文
- Decomposition Optimization for Minimizing Label Overflow in Prime Number Graph Labeling
- An Access Control Model for the Adhocracy Organization Using RBAC(Special Section on Cryptography and Information Security)
- RDFacl : A Secure Access Control Model Based on RDF Triple
- An Efficient Bottom-up Filtering of XML Messages by Exploiting the Postfix Commonality of XPath Queries
- Decomposition Optimization for Minimizing Label Overflow in Prime Number Graph Labeling