Abstract

The deficiencies of current access control techniques in solving the problems of manufacturing process access conflict in networked manufacturing environment were analyzed. An information model of manufacturing process was con-structed, and a case XML Schema of manufacturing task model was given. Based on the characteristic analysis of the access control for the information model, an improved access control model of manufacturing process was constructed, and the access control model based on manufacture tasks, roles and time limits and the relationships among the ele-ments were defined. The implementation mechanisms for access control model were analyzed, in which the access case matching strategy based on manufacture tasks and time limits, the authorization assignment mechanism based on manufacture tasks, roles, correlation degrees and time limits, XML based access control for transaction security and integrity were included. And the two-level detection architecture of transaction conflict was designed to find the con-flicts both in application and in the database. Finally the prototype system was developed based on these principles. Feasibility and effectiveness of the method were verified by an enterprise application.

Highlights

  • Networked manufacturing is an advanced manufacturing mode

  • The implementation mechanisms for access control model were analyzed, in which the access case matching strategy based on manufacture tasks and time limits, the authorization assignment mechanism based on manufacture tasks, roles and time limits, the resolution mechanism of concurrent operation conflicts were included

  • In networked manufacturing environment based on ASP, manufacturing process is split to a series of tasks after requirements are committed to Application Service Provider (ASP) by manufacturing requirement enterprises

Read more

Summary

Introduction

Some control models are put forward, such as Access Control Lists (ACLs) [3], Access Control Matrixes (ACM) [4], Discretionary Access Control (DAC) model [3], Role-Based Access Control (RBAC) model [5], Task-Based Access Control (TBAC) model [6], Task-Role-Based Access Control (TRBAC) model [4] These models have been widely discussed and applied in various fields [7,8,9,10], detailed discussion is needed in order to provide an effective access control mechanism for manufacturing process in networked manufacturing environment. That means effective access control is completely necessary to protect manufacturing process data and ensure the fluent execution of networked manufacturing. The problem of manufacturing process access among allied enterprises was solved

Related Work
Manufacturing Process in Networked Manufacturing Environment
Information Model of Manufacturing Process
Access Control Model of Manufacturing Process
Implementation Mechanisms for Access Control Model
Access Case Matching Strategy Based on Manufacture Tasks and Time Limits
Two-Level Detection Architecture of Transaction Conflict
XML-Based Security Standards
Application of the System and Analysis of Cases
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call