Research and implementation of user rights management algorithms based on RBAC model forexperimental teaching management system

The current experimental teaching management system has a large number of users than before. This problem causes the higher security requirements, complex management and lower efficiency of the teaching management system. Through the comparative analysis of the existing several kinds of access control mechanism and management algorithm, the role-based access has more advantages, we choose role-based access control model (RBAC) user permission management algorithm to build the bridge of users and permissions to increase flexibility and security by introducing user role. By Contrasting with these models response time, the simulation experiment proved the RBAC model is appropriate in the experimental teaching management system

[1]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[2]  K. J. Bma Integrity considerations for secure computer systems , 1977 .

[3]  Michael J. Nash,et al.  The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[4]  Tao Xie,et al.  Property Verification for Generic Access Control Models , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[5]  Jeffrey D. Ullman,et al.  Protection in operating systems , 1976, CACM.

[6]  Xianmin Wei Design and Implementation of Rights Management System Based on RBAC Model , 2011, 2011 International Conference on Computer and Management (CAMAN).

[7]  Ravi Sandhu,et al.  Implementation Considerations for the Typed Access Matrix Model in a Distributed Environment , 1992 .

[8]  Ravi S. Sandhu,et al.  Rationale for the RBAC96 family of access control models , 1996, RBAC '95.