Information Security based on Resource Conflict with SSH Architecture
Authors
Su Yu, Yin Wang, Ghassan M. Azar, Zhou Wei
Corresponding Author
Su Yu
Available Online August 2013.
- DOI
- 10.2991/icaise.2013.47How to use a DOI?
- Keywords
- RBAC, SOD, SSH, MVC, Security Constraint
- Abstract
Role-based access control has become the predominant model for advanced access control. SOD of RBAC is a good way to solve the problem of resource allocation and right management for improving the security of the system. According to the needs of the MVC-based information management system security, this paper researches separation of duties (SOD) in Role-Based Access Control, and then gives a program to implement RBAC model as the framework of SSH. Finally, this paper describes how to realize the RBAC in a specific information management system.
- Copyright
- © 2013, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Su Yu AU - Yin Wang AU - Ghassan M. Azar AU - Zhou Wei PY - 2013/08 DA - 2013/08 TI - Information Security based on Resource Conflict with SSH Architecture BT - Proceedings of the 2013 The International Conference on Artificial Intelligence and Software Engineering (ICAISE 2013) PB - Atlantis Press SP - 222 EP - 226 SN - 1951-6851 UR - https://doi.org/10.2991/icaise.2013.47 DO - 10.2991/icaise.2013.47 ID - Yu2013/08 ER -