Access Control for Manufacturing Process in Networked Manufacturing Environment

DOI: 10.4236/jssm.2009.22014   PDF   HTML     4,920 Downloads   8,754 Views   Citations


The deficiencies of current access control techniques in solving the problems of manufacturing process access conflict in networked manufacturing environment were analyzed. An information model of manufacturing process was con-structed, and a case XML Schema of manufacturing task model was given. Based on the characteristic analysis of the access control for the information model, an improved access control model of manufacturing process was constructed, and the access control model based on manufacture tasks, roles and time limits and the relationships among the ele-ments were defined. The implementation mechanisms for access control model were analyzed, in which the access case matching strategy based on manufacture tasks and time limits, the authorization assignment mechanism based on manufacture tasks, roles, correlation degrees and time limits, XML based access control for transaction security and integrity were included. And the two-level detection architecture of transaction conflict was designed to find the con-flicts both in application and in the database. Finally the prototype system was developed based on these principles. Feasibility and effectiveness of the method were verified by an enterprise application.

Share and Cite:

K. Zhou, M. Lv, G. Wang and B. Ren, "Access Control for Manufacturing Process in Networked Manufacturing Environment," Journal of Service Science and Management, Vol. 2 No. 2, 2009, pp. 107-116. doi: 10.4236/jssm.2009.22014.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] Y. S. Fan, “Connotation and key technologies of net-worked manufacturing,” Computer Integrated Manufac-turing Systems, Vol. 9, No. 7, pp. 576-582, 2003.
[2] P. Ward and C. L. Smith, “The development of access control policies for information technology systems,” Computers & Security, Vol. 21, No. 4, pp. 356-371, 2002.
[3] C. P. Pfleger, “Security in computing,” 2nd Edition, Pren-tice-Hall International Inc., Englewood Cliffs, NJ, 1997.
[4] S. Oh and S. Park, “Task-role-based access control model,” Information Systems, Vol. 28, pp. 533-562, 2003.
[5] J. Hwang, K. Wu, and D. Liu, “Access control with role attribute certificates,” Computer Standards & Interfaces, Vol. 22, pp. 43-53, 2000.
[6] J. Deng and F. Hong, “Task-based access control model,” Journal of Software, Vol. 14, No. 1, pp. 76-82, 2003.
[7] T. Xin and I. Ray, “A lattice-based approach for updating access control policies in real-time,” Information Systems, Vol. 32, pp. 755-772, 2007.
[8] S. Fu and C. Z. Xu, “Coordinated access control with temporal and spatial constraints on mobile execution in coalition environments,” Future Generation Computer Systems, Vol. 23, pp. 804-815, 2007.
[9] H. X. Cai, T. Yu, and M. L. Fang, “Access control of manufacturing grid,” Computer Integrated Manufacturing Systems, Vol. 13, No. 4, pp. 716-720, 2007.
[10] C. Liang, T. Y. Xiao, L. X. Zhang, “Access control for collaborative environment in networked manufacturing system,” Computer Integrated Manufacturing Systems, Vol. 13, No. 1, pp. 136-140, 152, 2007.
[11] T. Bray, J. Paoli, and C. M. Sperberg-McQueen (Eds), “Extensible Markup Language (XML) 1.0 (2nd Ed.),” W3C Recommendation, October 2000.
[12] R. Sandhu, E. J. Conyne, H. Lfeinstein, and C. E. You-man, “Role based access control models,” IEEE com-puter, Vol. 29, No. 2, pp. 38-47, 1996.
[13] W. H. Chen, X. C. Yin, B. Mao, and L. Xie, “A task and role-based access control model for web,” Journal of Computer Research and Development, Vol. 41, No. 9, pp. 1466-1473, 2004.
[14] Extensible Markup Language (XML) 1.0-W3C Recom-mendation 10-Feb-98. Http://
[15] N. N. Vuong, G. S. Smith, and Y. Deng, “Managing secu-rity policies in a distributed environment using eXtensible Markup Language (XML) ,” SAC, pp. 405-411, 2001.
[16] V. Kapsalis, L. Hadellis, D. Karelis, and S. Koubias, “A dynamic context-aware access control architecture for e-services,” Computers & Security, Vol. 25, pp. 507-521, 2006.
[17] C. A. Ardagna, E. Damiani, S. De Capitani di Vimercati, and P. Samarati, “XML-based access control languages,” Information Security Technical Report. Vol. 9, No. 3, pp. 1363-4127, 2004.
[18] C. Lu, X. J. Hu, C. L. He, etc., “Oracle 10g DBA,” Pub-lishing House of Electronics Industry, January 2007.
[19] L. Y. Wan, “Project of a VPD design based on role access control in Oracle,” Journal of Jiangxi Institute of Education (Comprehensive), Vol. 28, No. 3, pp. 33-36. 2007.
[20] L. Yao, and H. Z. Chen, “Oracle HTML DB application with virtual private database,” System Simulation Tech-nology, Vol. 2, No. 4, pp. 244-248, 2006.
[21] [A. L. Zhong and F. H. Xu, “A method of using manage-ment of role to enhance the security of ORACLE data-base,” Journal of Chengdu University (Natural Science Edition), Vol. 26, No. 3, pp. 225-227, 2007.
[22] K. Zhou, X. X. Wen, G. Wang, M. Lv, and Y. Q. Gong, “Key technologies of manufacturing information system management supporting networked manufacturing,” IEEE International Conference on Engineering, Services and Knowledge Management (the Management track of WiCom 2007), Shanghai, China, pp.6240-6243, Sep-tember 23-25, 2007.

comments powered by Disqus

Copyright © 2020 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.