Method for implementing core role-based access control based on attribute-based encryption
The present invention relates to a method for implementing a core role-based access control (RBAC) model based on a policy-attribute-based encryption algorithm. The method includes: creating and deleting a role and the related password information; creating and deleting a user and the related passwo...
Saved in:
Main Authors | , , , , , , |
---|---|
Format | Patent |
Language | Chinese English |
Published |
01.12.2017
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The present invention relates to a method for implementing a core role-based access control (RBAC) model based on a policy-attribute-based encryption algorithm. The method includes: creating and deleting a role and the related password information; creating and deleting a user and the related password information; implementing user/role relationship assignment and user/role relationship revocation through the use of the attribute-based encryption algorithm; implementing the role/authority relationship assignment and role/authority relationship revocation through the use of the attribute-based encryption algorithm; and implementing by the user the attribute-based decryption algorithm to achieve the access to the controlled resources, that is, the authorized decision. The method of the invention utilizes the cryptography method to ensure the correct implementation of the role-based access control model. The authorized decision does not depend on any third party, which can not only improve the safety and efficie |
---|---|
Bibliography: | Application Number: CN201710323674 |