LAI Tianping,WANG Yongchao,LUO Pan,et al.Research on the design and application of role-resource based access control model[J].Journal on Communications,2024,45(Z2):153-159.
LAI Tianping,WANG Yongchao,LUO Pan,et al.Research on the design and application of role-resource based access control model[J].Journal on Communications,2024,45(Z2):153-159. DOI: 10.11959/j.issn.1000-436x.2024234.
Research on the design and application of role-resource based access control model
The traditional role-based access control (RBAC) model plays a crucial role in permission management but faces challenges in Web applications
such as lack of resource definition
permission explosion
and permission leakage. To overcome these limitations and enhance the precision and flexibility of permission management
a role-resource based access control (R-RBAC) model was proposed
which introduced resource hierarchy on top of RBAC
effectively addressing the shortcomings of the traditional model. A detailed analysis of the limitations of the traditional RBAC model in Web development was provided
the importance of the R-RBAC model was discussed
and the design of the new model was elaborated. Through practical case studies
the advantages and application prospects of the R-RBAC model in permission management were demonstrated. The research shows that the R-RBAC model not only resolves the issue of permission explosion by enabling dynamic configuration and automatic assembly of permissions but also excels in permission auditing and tracking
significantly facilitating permission management. This study delves into the design and practical application of the role-resource based access control model
highlighting its importance in improving the precision and flexibility of permission management. Future research can further optimize the R-RBAC model and explore its applications in other domains to achieve more efficient and secure permission management.
关键词
Keywords
references
SANDHU R S , COYNE E J , FEINSTEIN H L , et al . Role-based access control models [J ] . Computer , 1996 , 29 ( 2 ): 38 - 47 .
WU S Y , LUO X , WANG W P , et al . Malicious URL detection based on multiple feature fusion [J ] . Journal of Software , 2021 , 32 ( 9 ): 2916 - 2934 .
JIANG D X , LIU Q X , ZHENG S L . Role and activity based digital campus access control model [J ] . Journal of Dalian Maritime University , 2010 , 36 ( 1 ): 132 - 134 .
COLE T B . Spring [J ] . The Journal of the American Medical Association , 2011 , 305 ( 11 ): 1066 .
LUO Z M , ZHU Y , ZHANG J Y , et al . Design of rubbish session data eliminator based on filter [J ] . Computer Engineering , 2009 , 35 ( 24 ): 78 - 80 .
LIU A D , DU X H , WANG N , et al . Access control policy generation method based on access control logs [J ] . Journal of Electronics & Information Technology , 2022 , 44 ( 1 ): 324 - 331 .