Abstract
According to the specific characteristics of a computer-supported cooperative design (CSCD) system, the characteristics of role delegation authorization (RDA) are analyzed and deduced, and a set of fitful status is arrived at. Because of the diversified characteristics of RDA features in different systems, the RDA model has multi-varying status. On the basis of the basic model of role-based access control (RBAC), some basic characteristics of RDA are summed up. Then, according to the specific characteristics of CSCD system, the characteristics of RDA are recombined to develop a RDA model that is suitable for the CSCD system. It is different from the conventional role authorization models of RBAC, that is, it adopts the decentralized authorization management instead of the centralized one in CSCD system, which makes the management more flexible. This model is verified through a specific case of CSCD system.
Similar content being viewed by others
References
Ferriaolo D, Kuhn R. Role-based access controls. In: Proceedings of 15th NIST-NCSC National Computer Security Conference. Baltimore: MD, October, 13–16, 1992, 554–563
Sandhu R S, Coyne E J, Feinstein H L, et al. Role-based access control model. IEEE Computer, 1996, 29(2): 38–47
Sandhu R S, Bhamidipati V, Coyne E, et al. The ARBAC97 model for role-based administration of roles: Preliminary description and outline. In: Proceedings of the Second ACM Workshop on Role-Based Access Control. NY: ACM Press, 1997, 41–50
Sandhu R S, Bhamidipati V, Munawer Q. The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and System Security, 1999, 2(1): 41–50
Sandhu R S, Bhamidipati V. Role-based administration of user-role assignment: The URA97 model and its oracle implementation. Journal of Computer Security, 1999, 7(4): 317–342
Sandhu R S. Future directions in role-based access control models. In: Gorodetski V I, ed. Proceedings of the Mathematical Methods, Models, and Architectures for Network Security Systems. Lecture Notes in Computer Science, Vol 2052. Berlin: Springer, 2001, 22–26
Zhang L H, Ahn G J, Chu B T. A rule-based framework for role-based delegation. ACM Transactions on Information and System Security, 2003, 6(3): 404–441
Li C K, Zhan Y Z, Mao B, et al. A role-based access control model for CSCW systems. Journal of Software, 2000, 11(7): 931–937 (in Chinese)
Barka E, Sandhu R S. Frame work for role-based delegation models. In: Proceedings of the 16th Annual Computer Security Application Conference. Washington D.C.: IEEE Computer Society, 2000, 168–176
Barka E, Sandhu R S. A role-based delegation model and some extensions. In: Proceedings of the 23rd National Information Systems Security Conference. Baltimore: NIST, 2000, 101–114
Author information
Authors and Affiliations
Corresponding author
Additional information
Translated from Journal of Northeastern University (Natural Science), 2006, 27(5): 548–551 [译自: 东北大学学报 (自然科学版)]
Rights and permissions
About this article
Cite this article
Xu, H., Liu, Y., Guo, X. et al. The role delegation authorization model of a computer-supported cooperative design system. Front. Mech. Eng. China 2, 201–204 (2007). https://doi.org/10.1007/s11465-007-0034-6
Issue Date:
DOI: https://doi.org/10.1007/s11465-007-0034-6