Computer and Modernization ›› 2010, Vol. 1 ›› Issue (11): 127-131,.doi: 10.3969/j.issn.1006-2475.2010.11.036

• 信息安全 • Previous Articles     Next Articles

Research on a RBAC-based User-to-user Delegation Model

HUANG Ye, WANG Han-hu   

  1. College of Computer Science & Information, Guizhou University, Guiyang 550025, China
  • Received:2010-07-07 Revised:1900-01-01 Online:2010-11-25 Published:2010-11-25

Abstract: With the rapid development of information and technology, the security of information is becoming a hot field of research. As a solution of security, the model of RBAC is widely used. The article firstly discusses the model of RBAC, and points out the shortcoming of this model. And then, the paper proposes a delegation model between users. At last, it shows the direction of research about this model.

Key words: RBAC, user-to-user delegation model, delegation, revocation

CLC Number: