Abstract
The deficiencies of current access control techniques in solving the problems of manufacturing process access conflict in networked manufacturing environment were analyzed. An information model of manufacturing process was con-structed, and a case XML Schema of manufacturing task model was given. Based on the characteristic analysis of the access control for the information model, an improved access control model of manufacturing process was constructed, and the access control model based on manufacture tasks, roles and time limits and the relationships among the ele-ments were defined. The implementation mechanisms for access control model were analyzed, in which the access case matching strategy based on manufacture tasks and time limits, the authorization assignment mechanism based on manufacture tasks, roles, correlation degrees and time limits, XML based access control for transaction security and integrity were included. And the two-level detection architecture of transaction conflict was designed to find the con-flicts both in application and in the database. Finally the prototype system was developed based on these principles. Feasibility and effectiveness of the method were verified by an enterprise application.
Highlights
Networked manufacturing is an advanced manufacturing mode
The implementation mechanisms for access control model were analyzed, in which the access case matching strategy based on manufacture tasks and time limits, the authorization assignment mechanism based on manufacture tasks, roles and time limits, the resolution mechanism of concurrent operation conflicts were included
In networked manufacturing environment based on ASP, manufacturing process is split to a series of tasks after requirements are committed to Application Service Provider (ASP) by manufacturing requirement enterprises
Summary
Some control models are put forward, such as Access Control Lists (ACLs) [3], Access Control Matrixes (ACM) [4], Discretionary Access Control (DAC) model [3], Role-Based Access Control (RBAC) model [5], Task-Based Access Control (TBAC) model [6], Task-Role-Based Access Control (TRBAC) model [4] These models have been widely discussed and applied in various fields [7,8,9,10], detailed discussion is needed in order to provide an effective access control mechanism for manufacturing process in networked manufacturing environment. That means effective access control is completely necessary to protect manufacturing process data and ensure the fluent execution of networked manufacturing. The problem of manufacturing process access among allied enterprises was solved
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.