Research on the design and application of role-resource based access control model

The traditional role-based access control (RBAC) model plays a crucial role in permission management but faces challenges in Web applications, such as lack of resource definition, permission explosion, and permission leakage. To overcome these limitations and enhance the precision and flexibility of...

Full description

Saved in:
Bibliographic Details
Main Authors: LAI Tianping, WANG Yongchao, LUO Pan, GAO Zhitong
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2024-11-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024234/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537096795291648
author LAI Tianping
WANG Yongchao
LUO Pan
GAO Zhitong
author_facet LAI Tianping
WANG Yongchao
LUO Pan
GAO Zhitong
author_sort LAI Tianping
collection DOAJ
description The traditional role-based access control (RBAC) model plays a crucial role in permission management but faces challenges in Web applications, such as lack of resource definition, permission explosion, and permission leakage. To overcome these limitations and enhance the precision and flexibility of permission management, a role-resource based access control (R-RBAC) model was proposed, which introduced resource hierarchy on top of RBAC, effectively addressing the shortcomings of the traditional model. A detailed analysis of the limitations of the traditional RBAC model in Web development was provided, the importance of the R-RBAC model was discussed, and the design of the new model was elaborated. Through practical case studies, the advantages and application prospects of the R-RBAC model in permission management were demonstrated. The research shows that the R-RBAC model not only resolves the issue of permission explosion by enabling dynamic configuration and automatic assembly of permissions but also excels in permission auditing and tracking, significantly facilitating permission management. This study delves into the design and practical application of the role-resource based access control model, highlighting its importance in improving the precision and flexibility of permission management. Future research can further optimize the R-RBAC model and explore its applications in other domains to achieve more efficient and secure permission management.
format Article
id doaj-art-6b0d833a4e164f858487923336520689
institution Kabale University
issn 1000-436X
language zho
publishDate 2024-11-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-6b0d833a4e164f8584879233365206892025-01-14T08:46:35ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2024-11-014515315979661492Research on the design and application of role-resource based access control modelLAI TianpingWANG YongchaoLUO PanGAO ZhitongThe traditional role-based access control (RBAC) model plays a crucial role in permission management but faces challenges in Web applications, such as lack of resource definition, permission explosion, and permission leakage. To overcome these limitations and enhance the precision and flexibility of permission management, a role-resource based access control (R-RBAC) model was proposed, which introduced resource hierarchy on top of RBAC, effectively addressing the shortcomings of the traditional model. A detailed analysis of the limitations of the traditional RBAC model in Web development was provided, the importance of the R-RBAC model was discussed, and the design of the new model was elaborated. Through practical case studies, the advantages and application prospects of the R-RBAC model in permission management were demonstrated. The research shows that the R-RBAC model not only resolves the issue of permission explosion by enabling dynamic configuration and automatic assembly of permissions but also excels in permission auditing and tracking, significantly facilitating permission management. This study delves into the design and practical application of the role-resource based access control model, highlighting its importance in improving the precision and flexibility of permission management. Future research can further optimize the R-RBAC model and explore its applications in other domains to achieve more efficient and secure permission management.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024234/RBACR-RBACpermission managementaccess control model
spellingShingle LAI Tianping
WANG Yongchao
LUO Pan
GAO Zhitong
Research on the design and application of role-resource based access control model
Tongxin xuebao
RBAC
R-RBAC
permission management
access control model
title Research on the design and application of role-resource based access control model
title_full Research on the design and application of role-resource based access control model
title_fullStr Research on the design and application of role-resource based access control model
title_full_unstemmed Research on the design and application of role-resource based access control model
title_short Research on the design and application of role-resource based access control model
title_sort research on the design and application of role resource based access control model
topic RBAC
R-RBAC
permission management
access control model
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024234/
work_keys_str_mv AT laitianping researchonthedesignandapplicationofroleresourcebasedaccesscontrolmodel
AT wangyongchao researchonthedesignandapplicationofroleresourcebasedaccesscontrolmodel
AT luopan researchonthedesignandapplicationofroleresourcebasedaccesscontrolmodel
AT gaozhitong researchonthedesignandapplicationofroleresourcebasedaccesscontrolmodel