Proceedings of the 2013 The International Conference on Artificial Intelligence and Software Engineering (ICAISE 2013)

Information Security based on Resource Conflict with SSH Architecture

Authors
Su Yu, Yin Wang, Ghassan M. Azar, Zhou Wei
Corresponding Author
Su Yu
Available Online August 2013.
DOI
10.2991/icaise.2013.47How to use a DOI?
Keywords
RBAC, SOD, SSH, MVC, Security Constraint
Abstract

Role-based access control has become the predominant model for advanced access control. SOD of RBAC is a good way to solve the problem of resource allocation and right management for improving the security of the system. According to the needs of the MVC-based information management system security, this paper researches separation of duties (SOD) in Role-Based Access Control, and then gives a program to implement RBAC model as the framework of SSH. Finally, this paper describes how to realize the RBAC in a specific information management system.

Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2013 The International Conference on Artificial Intelligence and Software Engineering (ICAISE 2013)
Series
Advances in Intelligent Systems Research
Publication Date
August 2013
ISBN
978-90-78677-71-0
ISSN
1951-6851
DOI
10.2991/icaise.2013.47How to use a DOI?
Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Su Yu
AU  - Yin Wang
AU  - Ghassan M. Azar
AU  - Zhou Wei
PY  - 2013/08
DA  - 2013/08
TI  - Information Security based on Resource Conflict with SSH Architecture
BT  - Proceedings of the 2013 The International Conference on Artificial Intelligence and Software Engineering (ICAISE 2013)
PB  - Atlantis Press
SP  - 222
EP  - 226
SN  - 1951-6851
UR  - https://doi.org/10.2991/icaise.2013.47
DO  - 10.2991/icaise.2013.47
ID  - Yu2013/08
ER  -