The access control is very important for the information management of modern enterprises . This paperproposes a framework of well-defined constraint specifications for developers to build application-level access con...The access control is very important for the information management of modern enterprises . This paperproposes a framework of well-defined constraint specifications for developers to build application-level access controlbased on users' roles. They ensure that each role is configured with consistent privileges, each actor is authorized toproper roles and then each actor can activate and play his authorized roles without interest conflicts. These formalconstraint specifications are described by the first-order predicate logic, and also some properties are proved. Themodel provides relatively independent, consistent and inferable constraint specifications for developers to design ac-cess control of large and complex enterprise systems.展开更多
文摘The access control is very important for the information management of modern enterprises . This paperproposes a framework of well-defined constraint specifications for developers to build application-level access controlbased on users' roles. They ensure that each role is configured with consistent privileges, each actor is authorized toproper roles and then each actor can activate and play his authorized roles without interest conflicts. These formalconstraint specifications are described by the first-order predicate logic, and also some properties are proved. Themodel provides relatively independent, consistent and inferable constraint specifications for developers to design ac-cess control of large and complex enterprise systems.