期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Permission and role automatic assigning of user in role-based access control 被引量:4
1
作者 韩道军 卓汉逵 +1 位作者 夏兰亭 李磊 《Journal of Central South University》 SCIE EI CAS 2012年第4期1049-1056,共8页
Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and th... Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and the operating process is complex.A new role analyzing method was proposed by generating mappings and using them to provide recommendation for systems.The relation among sets of permissions,roles and users was explored by generating mappings,and the relation between sets of users and attributes was analyzed by means of the concept lattice model,generating a critical mapping between the attribute and permission sets,and making the meaning of the role natural and operational.Thus,a role is determined by permission set and user's attributes.The generated mappings were used to automatically assign permissions and roles to new users.Experimental results show that the proposed algorithm is effective and efficient. 展开更多
关键词 role-based access control ROLE permission assignment concept lattice
下载PDF
Searchable Encryption with Access Control on Keywords in Multi-User Setting 被引量:2
2
作者 Lei Li Chungen Xu +2 位作者 Xiaoling Yu Bennian Dou Cong Zuo 《Journal of Cyber Security》 2020年第1期9-23,共15页
Searchable encryption technology makes it convenient to search encrypted data with keywords for people.A data owner shared his data with other users on the cloud server.For security,it is necessary for him to build a ... Searchable encryption technology makes it convenient to search encrypted data with keywords for people.A data owner shared his data with other users on the cloud server.For security,it is necessary for him to build a fine-grained and flexible access control mechanism.The main idea of this paper is to let the owner classify his data and then authorizes others according to categories.The cloud server maintains a permission matrix,which will be used to verify whether a trapdoor is valid or not.In this way we can achieve access control and narrow the search range at the same time.We prove that our scheme can achieve index and trapdoor indistinguishability under chosen keywords attack security in the random oracles. 展开更多
关键词 Searchable encryption access control cloud computing permission assignment
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部