Implementation Scheme of Role-Based Access Control with Identity Code

裘炅,谭建荣,马晨华
DOI: https://doi.org/10.3321/j.issn:1003-9775.2003.12.012
2003-01-01
Abstract:Identity code is introduced to represent roles and rights, while the synthesis of identity code represents the inheritance of roles as role derivation information. It provides security management on role authorization, role inheritance and data access authorization and it can adapt to a dynamically changing environment. Several special security requirements such as role private attribute and multi-role access control can also be satisfied. The scheme provides a more efficient authorization to simplify the management of access control and it can be applied better in large-scale network.
What problem does this paper attempt to address?