Please wait a minute...
New Technology of Library and Information Service  2007, Vol. 2 Issue (2): 75-77    DOI: 10.11925/infotech.1003-3513.2007.02.16
Current Issue | Archive | Adv Search |
Application of RBAC in Security Management of Defense Science and Technology Information
Tian Feng   Sun Hui
(China Defense Science and Technology Information Center, Beijing 100036, China)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

For the requirement of security and usability,Role Based Access Control (RBAC) is applied to realize the fine grain access control of defense S & T information resource by building data architecture model of information and user-level model, access control rule model.

Key wordsDefense S &      T information      Information security      Role based access control     
Received: 25 October 2006      Published: 25 February 2007
: 

TP309

 
Corresponding Authors: Sun Hui     E-mail: sunhui@cetin.net.cn
About author:: Tian Feng,Sun Hui

Cite this article:

Tian Feng,Sun Hui . Application of RBAC in Security Management of Defense Science and Technology Information. New Technology of Library and Information Service, 2007, 2(2): 75-77.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2007.02.16     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2007/V2/I2/75

1李立新等.在基于角色的安全系统中实现强制访问控制.小型微型计算机系统,2001,22(7):800-804
2Sandhu R S, Coyne E, FeiMtein H L, et al. Role-based access control models. IEEE Computer, 1996, 29(2):38-47
3乔颖等.一种基于角色访问控制(RBAC)的新模型及其实现机制.计算机研究与发展,2000,37(1):37-44
4陈林等.基于角色的多级访问控制模型.华中科技大学学报,2002,30(2):102-104
5钟华等.扩充角色层次关系模型及其应用.软件学报,2000,11(6):779-784
6李斓等.面向XML文档的细粒度强制访问控制模型.软件学报,2004,15(10):1528-1537

[1] Hua Bin, Wu Nuo, He Xin. Integrating Expert Reviews for Government Information Projects with Knowledge Fusion[J]. 数据分析与知识发现, 2021, 5(10): 124-136.
[2] Chi Maomao,Pan Meiyu,Wang Weijun. Impacts of Cue Consistency on Shared Accommodation Bookings: Interaction Between Texts and Images[J]. 数据分析与知识发现, 2020, 4(11): 74-83.
[3] Zhu Guang,Feng Mining,Zhang Weiwei. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[4] Yin Cong,Zhang Liyi. Recommendation Algorithm for Post-Context Filtering Based on TF-IDF: Case Study of Catering O2O[J]. 数据分析与知识发现, 2018, 2(11): 28-36.
[5] Dongsheng Zhai, He Liu, Jie Zhang, Liwei Cai. Managing Patent Semantic Knowledge with Graph Database[J]. 数据分析与知识发现, 2016, 32(12): 66-75.
[6] Yuan Xingfu, Zhang Pengyi, Wang Jun. “State-Behavior” Modeling and Its Application in Analyzing Product Information Seeking Behavior of E-commerce Websites Users[J]. 现代图书情报技术, 2015, 31(6): 93-100.
[7] Gao Jinsong, Liang Yanqi, Li Ke, Xiao Lian, Zhou Ximan. E-commerce Credit Information Service Model for Linked Data[J]. 现代图书情报技术, 2014, 30(6): 8-16.
[8] Zhang Zhixiong, Liu Jianhua, Xie Jing, Qian Li, Zhang Min, Yu Gaihong. Design and Implementation of the Service Cloud for Strategic S&T Information Monitoring[J]. 现代图书情报技术, 2014, 30(6): 51-61.
[9] Bi Qiang, Wang Yu. Fronts and Hotspots of the Application Research on Folksonomy Abroad[J]. 现代图书情报技术, 2013, 29(7/8): 36-42.
[10] Zhai Dongsheng, Chen Chen, Zhang Jie, Huang Lucheng, Ruan Pingnan. The Mining Research of Technical Efficiency and Application Map of Patent Information[J]. 现代图书情报技术, 2012, 28(7): 96-102.
[11] Zheng Dejun Ren Ni Xiong Jian Huang Shuiqing. Current Situation of Information Security Management in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 27-32.
[12] Huang Shuiqing Mao Yihong Xiong Jian. Assessment of Information Security Risk in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 33-38.
[13] Huang Shuiqing Ren Ni. Control of Information Security Risk in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 39-44.
[14] Xu Xin Huang Zhongqing Deng Sanhong. Design and Implementation of Internet Information Acquisition System on Overseas Chinese[J]. 现代图书情报技术, 2010, 26(7/8): 95-101.
[15] Jia Meiying,Yang Bingru,Zheng Dequan,Cao Hongqiang,Yang Jing,Zhang Lian. Sham Battle Information Extraction Based on Pattern Matching[J]. 现代图书情报技术, 2009, (9): 70-75.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn