Access Control for Manufacturing Process in Networked Manufacturing Environment

The deficiencies of current access control techniques in solving the problems of manufacturing process access conflict in networked manufacturing environment were analyzed. An information model of manufacturing process was con-structed, and a case XML Schema of manufacturing task model was given. Based on the characteristic analysis of the access control for the information model, an improved access control model of manufacturing process was constructed, and the access control model based on manufacture tasks, roles and time limits and the relationships among the ele-ments were defined. The implementation mechanisms for access control model were analyzed, in which the access case matching strategy based on manufacture tasks and time limits, the authorization assignment mechanism based on manufacture tasks, roles, correlation degrees and time limits, XML based access control for transaction security and integrity were included. And the two-level detection architecture of transaction conflict was designed to find the con-flicts both in application and in the database. Finally the prototype system was developed based on these principles. Feasibility and effectiveness of the method were verified by an enterprise application.

[1]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[2]  Indrakshi Ray,et al.  A lattice-based approach for updating access control policies in real-time , 2007, Inf. Syst..

[3]  Deng Ji Task-Based Access Control Model , 2003 .

[4]  Fan Yu-shun Connotation and Key Technologies of Networked Manufacturing , 2003 .

[5]  Seog Park,et al.  Task-role-based access control model , 2003, Inf. Syst..

[6]  Stavros A. Koubias,et al.  A dynamic context-aware access control architecture for e-services , 2006, Comput. Secur..

[7]  K. Zhou,et al.  Key Technologies of Manufacturing Information System Management Supporting Networked Manufacturing , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[8]  Chen Wei A Task and Role-Based Access Control Model for Web , 2004 .

[9]  Ernesto Damiani,et al.  XML-based access control languages , 2004, Inf. Secur. Tech. Rep..

[10]  Geoffrey Smith,et al.  Managing security policies in a distributed environment using eXtensible markup language (XML) , 2001, SAC.

[11]  Hong Fan,et al.  Task-Based Access Control Model , 2003 .

[12]  Zhang Lin-xuan Access control for collaborative environment in networked manufacturing system , 2007 .

[13]  Clifton L. Smith,et al.  The Development of Access Control Policies for Information Technology Systems , 2002, Comput. Secur..

[14]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[15]  Wan Li-yong Project of a VPD Design Based on Role Access Control in Oracle , 2007 .

[16]  Chen Hongzhong Oracle HTML DB Application with Virtual Private Database , 2006 .

[17]  Cheng-Zhong Xu,et al.  Coordinated access control with temporal and spatial constraints on mobile execution in coalition environments , 2007, Future Gener. Comput. Syst..

[18]  Duen-Ren Liu,et al.  Access control with role attribute certificates , 2000 .

[19]  Fang Ming-lun Access control of manufacturing grid , 2007 .