Role-Based Access Control Models
Computer
Enforcing security and safety models with an information flow analysis tool
Proceedings of the 2004 annual ACM SIGAda international conference on Ada: The engineering of correct and reliable software for real-time & distributed systems using Ada and related technologies
Feasibility study of software reengineering towards role-based access control
International Journal of Computer Applications in Technology
EMAP: An efficient mutual authentication protocol for passive RFID tags
International Journal of Automation and Computing
METrust: A mutual evaluation-based trust model for P2P networks
International Journal of Automation and Computing
Admission control with elastic QoS for video on demand systems
International Journal of Automation and Computing
Hi-index | 0.01 |
The content security requirements of a radio frequency identification (RFID) based logistics-customs clearance service platform (LCCSP) are analysed in this paper. Then, both the unified identity authentication and the access control modules are designed according to those analyses. Finally, the unified identity authentication and the access control on the business level are implemented separately. In the unified identity authentication module, based on an improved Kerberos-based authentication approach, a new control transfer method is proposed to solve the sharing problem of tickets among different servers of different departments. In the access control module, the functions of access controls are divided into different granularities to make the access control management more flexible. Moreover, the access control module has significant reference value for user management in similar systems.