Skip to main content

2016 | OriginalPaper | Buchkapitel

Aquaculture Access Control Model in Intelligent Monitoring and Management System Based on Group/Role

verfasst von : Qiyu Zhang, Yingyi Chen, Zhumi Zhen, Jing Xu, Ling Zhu, Liangliang Gao, Yanzhong Liu

Erschienen in: Computer and Computing Technologies in Agriculture IX

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Aquaculture intelligent monitoring and management system (AIMAMS) is a web information system covering businesses, home users, and management of aquaculture information, which have many users. The information security and safety equipment of different users is an important issue that we have to consider. Role-based access control introduces the roles concept into user and access rights, and its basic feature are that divide roles depending on the security policy, assign operating license for each role, and assign roles to each user. The user can access the specified object based on their respective roles. In order to achieve different user needs for security, aquaculture access control model based on group/role is developed which is based on analysis of the role-based access control model. Aquaculture intelligent monitoring and management system consists of system administrators, business users, family farming users and technicians, each category contains a number of other users who have different permissions. For such a complex distribution of competences, the user groups are introduced here on the basis of idea of role-based access control model. Users are divided into four groups which correspond to four categories of users, each group is given the largest collection of operational authority, and the users of each group are assigned different roles, which have all or part of privileges of the current group. Technicians can access business and family farming user’s information, but cannot view some sensitive data, such as price, therefore, technicians group is controlled by field-level permissions of data tables, the sensitive fields of business and family farming user data tables is shielded. This model can effectively reduce the overhead of rights management, and can improve system’s scalability. Along with the needs of business development, the system can easily add new user groups and assign permissions and roles for them. This aquaculture access model is universal, it is not only suitable for aquaculture intelligent monitoring and management system but also has reference value for other systems.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ferraiolo, D.F., Richard Kuhn, D., Chandramouli, R.: Role-Based Access Control, 2nd edn. Artech House, London (2007)MATH Ferraiolo, D.F., Richard Kuhn, D., Chandramouli, R.: Role-Based Access Control, 2nd edn. Artech House, London (2007)MATH
2.
Zurück zum Zitat Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29, 38–47 (1996)CrossRef Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29, 38–47 (1996)CrossRef
3.
Zurück zum Zitat Shin, M.E., Ahn, G.-J.: UML-based representation of role-based access control. In: IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000), pp. 195–200 (2000) Shin, M.E., Ahn, G.-J.: UML-based representation of role-based access control. In: IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000), pp. 195–200 (2000)
4.
Zurück zum Zitat Zhang, W.: Research on role-based access control and its application in court system. Southwest Jiaotong University, Chengdu (2003) Zhang, W.: Research on role-based access control and its application in court system. Southwest Jiaotong University, Chengdu (2003)
5.
Zurück zum Zitat Yun, L.: The application of role-based access control technology in union equipment management center system. Xidian University, Xian (2007) Yun, L.: The application of role-based access control technology in union equipment management center system. Xidian University, Xian (2007)
6.
Zurück zum Zitat Xu, J., Chen, D.: Research of permission management based on role and discretionary access control. Softw. Guide 12(9), 160–162 (2010) Xu, J., Chen, D.: Research of permission management based on role and discretionary access control. Softw. Guide 12(9), 160–162 (2010)
7.
Zurück zum Zitat Zhang, H., Liu, Z., Li, Y., et al.: Research and application of role-based access control in privilege management. Microcomput. Inf. 22(9–3), 29–31 (2006) Zhang, H., Liu, Z., Li, Y., et al.: Research and application of role-based access control in privilege management. Microcomput. Inf. 22(9–3), 29–31 (2006)
8.
Zurück zum Zitat Yang, F., Zhang, B.: RBAC based classified application system access control method design. In: The Paper Collection of 2012 MIS/S & A Academic Conference, pp. 182–185 (2012) Yang, F., Zhang, B.: RBAC based classified application system access control method design. In: The Paper Collection of 2012 MIS/S & A Academic Conference, pp. 182–185 (2012)
9.
Zurück zum Zitat Tang, P., Chen, M., Liu, L., et al.: Design and implementation of a practical role-based access control model. Comput. Appl. 22(12), 41–43 (2002) Tang, P., Chen, M., Liu, L., et al.: Design and implementation of a practical role-based access control model. Comput. Appl. 22(12), 41–43 (2002)
10.
Zurück zum Zitat Wang, Z., Feng, S.: Specify RBAC constraints using object constraint language. Comput. Eng. Appl. 39(21), 100–102, 109 (2003) Wang, Z., Feng, S.: Specify RBAC constraints using object constraint language. Comput. Eng. Appl. 39(21), 100–102, 109 (2003)
11.
Zurück zum Zitat Zhang, H., Zhou, J., Zhang, B.: Research of extension of static constraints mechanism in RBAC Model. J. Beijing Univ. Posts Telecommun. 31(3), 123–127 (2008) Zhang, H., Zhou, J., Zhang, B.: Research of extension of static constraints mechanism in RBAC Model. J. Beijing Univ. Posts Telecommun. 31(3), 123–127 (2008)
12.
Zurück zum Zitat Guang-yu, D., Si-han, Q., Ke-long, L.: Role-based authorization constraint with time character. J. Softw. 13(8), 1521–1527 (2002) Guang-yu, D., Si-han, Q., Ke-long, L.: Role-based authorization constraint with time character. J. Softw. 13(8), 1521–1527 (2002)
13.
Zurück zum Zitat Wu, X.: Web applications of role-based access control. Dalian University of Technology, DaLian (2002) Wu, X.: Web applications of role-based access control. Dalian University of Technology, DaLian (2002)
14.
Zurück zum Zitat Fan, J., Guan, B., Li, X.: Design of extended role-based access control model and its implementation. Comput. Eng. Des. 29(18), 4178–4721 (2008) Fan, J., Guan, B., Li, X.: Design of extended role-based access control model and its implementation. Comput. Eng. Des. 29(18), 4178–4721 (2008)
Metadaten
Titel
Aquaculture Access Control Model in Intelligent Monitoring and Management System Based on Group/Role
verfasst von
Qiyu Zhang
Yingyi Chen
Zhumi Zhen
Jing Xu
Ling Zhu
Liangliang Gao
Yanzhong Liu
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-48357-3_8