What Is an Access Code?
With the continuous development of distributed computing, traditional role-based security models have been unable to meet the requirements of distributed security. According to code access security, an evidence-based code access control (EBCAC) model is introduced here, and a formal description is given. The model can implement lower-level access control of the system, that is, Access control at lower code level and user role level.
- With the continuous development of distributed computing, traditional
- The biggest feature of EBCAC is that it implements support for the lower level of the system --- code authorization management. Traditional RBAC security control focuses on the authorization management of users and their roles. In a distributed environment, the importance of user roles has changed greatly. RBAC alone can no longer effectively control system security. EBCAC Start with the basic code and implement authorization management based on the code identity.
Another feature of EBCAC is that the definition of security policies and their levels truly reflects the actual situation of the enterprise's security zone and hierarchical management, enabling system administrators to control low-level code access at a level similar to enterprise business management .
EBCAC not only implements coarse-grained control at the enterprise level and machine level, but also enables fine-grained code control at the user level and program level [1] .