Journal of South China University of Technology(Natural Science Edition) ›› 2004, Vol. 32 ›› Issue (9): 13-16.

Previous Articles     Next Articles

A Tree Role -based Access Control Strategy and Its Implementation

Zeng Ming Chen Li- ding   

  1. College of Automation Science and Engineering‚South China Univ.of Tech.‚Guangzhou510640‚Guangdong‚China
  • Received:2004-01-02 Online:2004-09-20 Published:2015-09-09
  • Contact: 曾明(1977-)‚男‚助教‚主要从事智能信息系统集成方面的研究. E-mail:zengm@scut.edu.cn
  • About author:曾明(1977-)‚男‚助教‚主要从事智能信息系统集成方面的研究.

Abstract: For the enterprises characterized by high-coupling jobs and crossing businesses‚it is difficult to implement the administration of information system privilege by utilizing the traditional access control strategies based on user or role.In this paper‚according to the basic theory of the RBAC (Role-based Access Control)‚a mult- i layered TRBAC (Tree Role-based Access Control) model was presented and a role-based privilege administration scheme was imple-mented in the application layer.The practical example indicates that the TRBAC simplifies the configuration rules of user‚role and permission‚and makes the privilege management more convenient.

Key words:  tree role, access control, privilege management, database application system