2006
DOI: 10.1631/jzus.2006.a0240
|View full text |Cite
|
Sign up to set email alerts
|

An application-layer based centralized information access control for VPN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2008
2008
2015
2015

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 10 publications
(1 citation statement)
references
References 19 publications
0
1
0
Order By: Relevance
“…One drawback of the RBAC model is that its control granularity and flexibility is not as good as that of the normal user-based access control model, because of the decoupling of the user set and the permission set. To address this issue, a hybrid user/role privilege mechanism at application-layer was proposed in Reference [13], based on a centralized information access control model. Though it gave an integrated formal definition and control rules for the hybrid privilege mechanism, it did not provide uniform semantics for it, and hence it could not provide a clear guideline for the implementation of the hybrid user/ role privilege mechanism.…”
Section: Introductionmentioning
confidence: 99%
“…One drawback of the RBAC model is that its control granularity and flexibility is not as good as that of the normal user-based access control model, because of the decoupling of the user set and the permission set. To address this issue, a hybrid user/role privilege mechanism at application-layer was proposed in Reference [13], based on a centralized information access control model. Though it gave an integrated formal definition and control rules for the hybrid privilege mechanism, it did not provide uniform semantics for it, and hence it could not provide a clear guideline for the implementation of the hybrid user/ role privilege mechanism.…”
Section: Introductionmentioning
confidence: 99%