{"title":"A Design and Implementation of Data Access Control in Digital Campus System Using the RBAC Method","authors":"Zhenghe Liang, Xuefeng Huang, Lin Pan, Jiguo Li","doi":"10.1109/ISITAE.2007.4409286","DOIUrl":null,"url":null,"abstract":"Role based access control (RBAC) used in system software like operating system and database system usually. Using in application system software like digital campus system is difficult, because data access permissions control in application system is very complex. Data access permissions control design and implementation was given in the major application system , through the role based access control (RBAC), rules granted to roles, roles granted to users, setting up rules library for data access control. Permissions rules are described by XML, including three kinds of rules such as: time control, row sets control, column sets control.","PeriodicalId":332503,"journal":{"name":"2007 First IEEE International Symposium on Information Technologies and Applications in Education","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 First IEEE International Symposium on Information Technologies and Applications in Education","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISITAE.2007.4409286","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Role based access control (RBAC) used in system software like operating system and database system usually. Using in application system software like digital campus system is difficult, because data access permissions control in application system is very complex. Data access permissions control design and implementation was given in the major application system , through the role based access control (RBAC), rules granted to roles, roles granted to users, setting up rules library for data access control. Permissions rules are described by XML, including three kinds of rules such as: time control, row sets control, column sets control.