Abstract
RBAC has been widely used for the reason of its efficiency, convenience and safety. But as the traditional user-oriented access control strategy, the RBAC carries the disadvantage of user-oriented access control as well. It always assumes that the application is credible and the behavior of the program represents the wishes of the user. However, this assumption is increasingly proving to be false and numbers of prevalent types of security attacks leverage this weakness to misuse the authority of users. Based on RBAC and learn from the concept of FBAC, this paper will proposed a solution about generating roles for application.
Publisher
Trans Tech Publications, Ltd.