Font Size: a A A

Research And Implementation Of An Access Control Model Based On Region

Posted on:2019-05-26Degree:MasterType:Thesis
Country:ChinaCandidate:Q ZhongFull Text:PDF
GTID:2348330542498621Subject:Software engineering
Abstract/Summary:PDF Full Text Request
As an information-based society the world already is,data security issues are increasingly prominent.Access control is not only an significant means to ensure data security and normal operation of the system,but also an essential function of the system.Hence,further study and improvements are needed to solve the problem of access control.With the development of the Internet and the rise of processing technologies concerning big data,today's information management systems and back-office services are based on mass data.The sources of data are becoming more and more extensive,and user's regions are distributed widely for there is an increasing number of users.In this context,more and more systems demand access control based on region.In the same role,users in different regions need to assign different operation permissions to data in different regions.This paper will focus on an in-depth research on the system that needs access control based on region,analyze what features are needed and abstract situations that access control based on region is necessary,so as to solve issues of systematic access control.Given that RBAC access control model can not address regional access control,this paper introduced regional constraint rules and put forward RBAC-RB,a new access control model based on region,through in-depth research on ABAC and traditional model.The elements,formula description,the constraints and working principles of the model will be elaborated in detail.Based on the thought of the model,an access control system based on region can be achieved.Applying the system to the WIFI fence system,this paper will address practical issues of regional access control so that correctness and availability of RBAC-RB model can be proved.
Keywords/Search Tags:RBAC, ABAC, RBAC-RB, access control, region
PDF Full Text Request
Related items