J. Service Science & Management, 2009, 2: 107-116
Published Online June 2009 in SciRes (www.SciRP.org/journal/jssm)
Copyright © 2009 SciRes JSSM
Access Control for Manufacturing Process in
Networked Manufacturing Environment
Ke Zhou, Min Lv, Gang Wang, Bingyin Ren
Advanced Manufacturing Technology Center, School of Mechatronics Engineering, Harbin Institute of Technology, Harbin, 150001,
China.
E-mail: k.zhou.hit@163.com
Received April 19th, 2008; revised September 16th, 2008; accepted November 10th, 2008.
ABSTRACT
The deficiencies of current access control techniques in solving the problems of manufacturing process access conflict
in networked manufacturing environment were analyzed. An information model of manufacturing process was con-
structed, and a case XML Schema of manufacturing task model was given. Based on the characteristic analysis of the
access control for the information model, an improved access control model of manufacturing process was constructed,
and the access control model based on manufacture tasks, roles and time limits and the relationships among the ele-
ments were defined. The implementation mechanisms for access control model were analyzed, in which the access case
matching strategy based on manufacture tasks and time limits, the authorization assignment mechanism based on
manufacture tasks, roles, correlation degrees and time limits, XML based access control for transaction security and
integrity were included. And the two-level detection architecture of transaction conflict was designed to find the con-
flicts both in application and in the database. Finally the prototype system was developed based on these principles.
Feasibility and effectiveness of the method were verified by an enterprise application.
Keywords: networked manufacturing, manufacturing process, access control, conflict resolution
1. Introduction
Networked manufacturing is an advanced manufacturing
mode. It is implemented by enterprises in order to re-
sponse quickly to the market requirements and to pro-
mote the competition ability in the environment of
knowledge economy and global manufacturing [1]. Ac-
cess control is one of the most pervasive security mecha-
nisms in use today [2]. It concerns whether specific users
or processors can access specific system resources or not
and which operation types they are allowed.
Many issues in access control are studied in order to
implement information interaction in multi-user system.
Some control models are put forward, such as Access
Control Lists (ACLs) [3], Access Control Matrixes
(ACM) [4], Discretionary Access Control (DAC) model
[3], Role-Based Access Control (RBAC) model [5],
Task-Based Access Control (TBAC) model [6],
Task-Role-Based Access Control (TRBAC) model [4].
Although these models have been widely discussed and
applied in various fields [7-10], detailed discussion is
needed in order to provide an effective access control
mechanism for manufacturing process in networked
manufacturing environment.
Present access control strategies applied in networked
manufacturing were focused on access issues for public
information, such as resource information, process plan-
ning information, design information, product data in-
formation, etc. The access control for manufacturing
process has not been studied intensively yet. There are
two reasons for it. One is that there are too much data
about manufacturing process, and many of them are very
hard to be collected because of the old machine tools.
The other one is that the access to manufacturing process
is much more flexible because of the multitudinous con-
straints between users and access objects, after manu-
facturing process is split and manufacturing tasks are
merged in networked manufacturing environment. That
makes the access control more difficult. Real-time manu-
facturing process supervision becomes more executable
as the technology of digital supervision, remote control
and network is developed. Data of manufacturing proc-
ess would be quite open to numerous users in networked
manufacturing environment. That means effective access
control is completely necessary to protect manufacturing
process data and ensure the fluent execution of net-
worked manufacturing.
KE ZHOU, MIN LV, GANG WANG, BINGYIN REN
108
The eXtensible Markup Language (XML) [11] has
emerged as the defacto standard for storing and ex-
changing information in the Internet Age. Several at-
tempts are being made to ensure security over the Inter-
net, especially for web services, including confidentiality,
integrity, authentication, authorization, key management
and security enforcement mechanism. Row-level security
(RLS) feature provides fine-grained access control
(FGAC) which means the control is at the individual row
level. Virtual private databases (VPD) security provides
a whole new way to control access to Oracle data.
In this paper, based on the characteristic analysis of
the access control for manufacturing process in net-
worked manufacturing environment, an access control
model of manufacturing process was constructed, and the
access control model based on manufacture tasks, roles
and time limits and the relationships among the elements
were defined. The implementation mechanisms for ac-
cess control model were analyzed, in which the access
case matching strategy based on manufacture tasks and
time limits, the authorization assignment mechanism
based on manufacture tasks, roles and time limits, the
resolution mechanism of concurrent operation conflicts
were included. Then the problem of manufacturing
process access among allied enterprises was solved.
2. Related Work
ACLs and ACM [3,4] is earlier access control model.
The two models are simple and intuitive. But the disad-
vantage is that they can’t deal with large amount of data.
When the number of subjects and objects becomes huge,
the cost of managing ACLs or ACM multiplies. There-
fore, they are not suitable for large enterprises. In DAC
model [3], the owner of computer resources or anyone
authorized decide who can access these resources.
Among the above methods, the subjects they face are
only single user. And the security administration and
review is very complicated [3]. The concept of RBAC
began with multi-user and multi-application on-line sys-
tems pioneered in 1970s [12]. The central motion of
RBAC is that permissions are associated with roles, and
users are assigned to appropriate roles. Roles are created
for the various job functions in an organization and roles
are assigned to the users according to their responsibili-
ties and qualifications. In RBAC, roles can be easily re-
assigned from one user to another, which greatly simpli-
fies the management of permissions. But the method
doesn’t support the active access control in workflow
environment. TBAC [6] considers workflow as a set of
tasks that are linked to achieve a common goal. The
model dynamically manages the permissions through the
tasks and tasks’ states. It distinguishes the access right
assignment and access right activation. And it supports
dynamic activation of access right needed in workflow
systems. But it is difficult to combine with roles.
T-RBAC [4] is based on RBAC model, and therefore it
contains the basic features of RBAC. However, it is
more than RBAC. It analyzes the types of task in enter-
prise organization, and connects the users with permis-
sion through role and task. It supports task level access
control, both active and passive access control, different
access control strategy according to task class, and par-
tial inheritance of access rights in the role hierarchy.
However, it doesn’t support the object hierarchy and
operation hierarchy. The TRBAC model in paper [13]
can meet the need to manage and enforce the strong and
efficient access control technology in large-scale Web
environments. The implementation of TRBAC on the
Web is also illustrated. Finally, the Web application
adopting the TRBAC model, called E-Government Offi-
cial Document Flow & Processing System, is given to
demonstrate the feasibility.
EXtensible Markup Language (XML) specification
[14] is the work of the World Wide Web Consortium
(W3C) Standard Generalized Markup Language (SGML)
Working Group. It is designed as a meta-language for
Internet use. Its objectives are to overcome the rigid Hy-
perText Markup Language (HTML) tagging scheme
while providing Web users with a means for defining
their own domain specific tags and attributes. XML is
used in the integration of applications which makes data
sharing and communication within applications easier
and uniform. Security is an important aspect of web ser-
vices. Securing XML data is critical to the success of any
web based applications or web services. Some practical
concepts that can be employed in an enterprise environ-
ment for managing security policies using XML are de-
scribed. An example is given using the proposed con-
cepts with Java and Role-Based Access Control (RBAC)
policies [15]. In paper [16], the context-aware access
control architecture is present in order to support
fine-grained authorizations for the provision of
e-services, based on an end-to-end web services infra-
structure. Access permissions to distributed web services
are controlled through an intermediary server, in a com-
pletely transparent way to both clients and protected re-
sources. The access control mechanism is based on
RBAC model, which incorporates dynamic context in-
formation, in the form of context constraints. Context is
dynamically updated and provides a high level of ab-
straction of the physical environment by using the con-
cepts of simple and composite context conditions. In
paper [17], they focus on XML-based access control
languages and, in particular, on the eXtensible Access
Control Markup Language (XACML), a recent OASIS
standardization effort. XACML is designed to express
authorization policies in XML against objects that are
themselves identified in XML. XACML can represent
the functionalities of most policy representation mecha-
nisms.
Copyright © 2009 SciRes JSSM
KE ZHOU, MIN LV, GANG WANG, BINGYIN REN109
Row-level security (RLS) feature is introduced in Ora-
cle8i. It provides fine-grained access control (FGAC)
which means the control is at the individual row level.
Virtual private databases (VPD) security provides a
whole new way to control access to Oracle data. Most
interesting is the dynamic nature of a VPD. At runtime,
Oracle performs these near magical feats by dynamically
modifying the SQL statement of the end user [18].
Rather than opening up an entire table to any individual
user who has any privileges on the table, row-level secu-
rity restricts access to specific rows in a table. The result
is that any individual user sees a completely different set
of data, only the data that person is authorized to see. In
paper [19], the limitations and shortcomings of security
design of the traditional database access control model
are analyzed. Projects of VPD design based on role ac-
cess control are presented [19,20]. The question of the
inconsistency of users’ authority management for appli-
cation system and database management system in
ORACLE DB brings insecurity to database. RBAC tech-
nology is used to implement users’ authority control for
front and back system in paper [21].
3. Manufacturing Process in Networked
Manufacturing Environment
3.1 Access Control for Manufacturing Process
in Networked Manufacturing Environment
Manufacturing process of product is composed of a se-
ries of manufacturing tasks according to production flow
in discrete manufacturing industry [22]. In networked
manufacturing environment based on ASP, manufactur-
ing process is split to a series of tasks after requirements
are committed to Application Service Provider (ASP) by
manufacturing requirement enterprises. Then manufac-
turing tasks are merged and distributed to execution en-
terprises. Therefore access to manufacturing process
should be split into access to tasks and reorganized.
Real-time data of manufacturing process were trans-
ferred through network from manufacturing fields to
manufacturing execution enterprises and manufacturing
requirement enterprises to monitor the process and
communicate. There are several characteristics in access
control for manufacturing process in networked manu-
facturing environment.
1) Distribution of user privilege was constrained dy-
namically by manufacturing process. Access privilege
distributed to user was not invariable, but varied with the
change of manufacturing tasks. Following with the
manufacturing process, access privilege of various roles
would be changed with the flowing of workflow. And
operations of access object were given different priori-
ties.
2) User privileges were interdependent and mutu-
ally-restrained. Manufacturing information was shared
by users in networked manufacturing through network to
increase the resource utilization rate. Access to some
information was limited of the number of visits. For ex-
ample the application of the simulation software would
be limited of point number purchased. It is the key of
access control for manufacturing process that how to
distribute the authority to the users to maximize the effi-
ciency of limited resources.
3) Distribution of user privileges was constrained by
time limits. High-quality product and delivery on sched-
ule is the basis of long-term collaboration of enterprise.
Adjusting of users’ privileges was necessary based on
time limits besides assigning authorization based on
manufacturing tasks.
3.2 Information Model of Manufacturing Process
Manufacturing information flow in networked manufac-
turing environment was studied to make the manufactur-
ing information model more reasonable. Products and
process planning were designed by design department
after the enterprise received orders. Then production was
organized by production department according to process
planning design information. Products were manufac-
tured according to resource utilization information and
production plan/schedule. Resource configurations were
optimized by dispatching department according to the
equipment utilization rates, site utilization rates and so
on. Quality information was collected into the financial
department after the products were manufactured. The
quality-cost analysis information was put forward by the
financial department which could be an index to opti-
mize the designs, production planning and manufactur-
ing processes. Every department could be in different
places in networked manufacturing environment. There-
fore the manufacturing information interaction was more
difficult. A manufacturing information model was con-
structed to describe information interaction of design,
manufacturing, quality inspection and resource utiliza-
tion among allied enterprises.
As the object of access control, manufacturing proc-
esses information mainly includes information of manu-
facturing tasks, dispatching, quality of on line products,
product quality inspection, machine tools, fixture tools,
work-piece rough, product structure information and NC
programs. Manufacturing tasks and dispatching organ-
izes production by the ID of product resources (example
as machine tool, fixture tool). Machining accuracy, eco-
nomic parameter and utilization efficiency influences
task allocation and dispatching making. Quality informa-
tion of on line products, product quality inspection in-
formation and quality statistics information use manu-
facturing task information to trace and compute product
Copyright © 2009 SciRes JSSM
KE ZHOU, MIN LV, GANG WANG, BINGYIN REN
Copyright © 2009 SciRes JSSM
110
Figure 1. Partial information model of manufacturing process
<xsdelement name="MT">
<xsdcomplexType>
<xsdelement name="Input" minOccurs="0"/>
<xsdelement name="Output" minOccurs="0"/>
<xsdelement name="Deadline"/>
<xsdelement name="Status"/>
<xsdelement name="Description "/>
<xsdattribute name="Id" type="xsdNMTOKEN" use="required"/>
<xsdattribute name="Name" type="xsdstring"/>
</xsdcomplexType>
</xsdelement>
<xsdelement name="MT">
<xsdcomplexType>
<xsdelement name="MT"
minOccurs="0" maxOccurs="unbounded"/>
</xsdcomplexType>
</xsdelement>
<xsdelement name="Deadline" type="xsdstring"/>
<xsdelement name="Status" type="xsdstring"/>
<xsdelement name="Description" type="xsdstring"/>
Figure 2. The case XML Schema of manufacturing task model
KE ZHOU, MIN LV, GANG WANG, BINGYIN REN111
quality. Meanwhile, feedback information of quality has
influence on task dispatching. Partial information model
of manufacturing process was showed in Figure 1. The
case XML Schema of manufacturing task model is
showed in Figure 2.
4. Access Control Model of Manufacturing
Process
Objects and operations of access were controlled by us-
ers’ roles in traditional Role-Based Access Control
(RBAC) model. But there are other factors influencing
access authorization in networked manufacturing envi-
ronment, such as manufacture tasks, correlation degrees,
time limits. Based on the characteristic of access control
for manufacturing process, an improved access control
model based on manufacture tasks, roles and time limits
was constructed as showed in Figure 3. The elements and
the relationships among the elements were defined as
below.
Definition1. The access control model based on manu-
facture tasks, roles and time limits was a eleven-dimen-
sion arrayMT, R, U, Tl, W, S, O, OP, C, P, SP, where:
Manufacture task sets (MT): the tasks in the manufac-
turing system. Task was a basic unit to accomplish one
working target. There were five states in the task lifecy-
cle: initial state, active state, suspensive state, termina-
tive state and revocatory state. They were quantized re-
spectively as 30, 40, 20, 10 and 0.
Role sets (R): A role was a group of interrelated au-
thorizations. Usually one role delegated one work or
position in an organization or a task. Roles could be ad-
ministrative positions or technical roles in a manufactur-
ing system.
User sets (U): the independent subjects that could ac-
cess the information in the system.
Figure 3. Improved access control model based on manu-
facture tasks, roles and time limits
Workflow sets (W): Manufacture tasks (MT) were split
into subtasks and activities as workflows.
Time limit state sets (Tl): Let the time limit of a cer-
tain manufacture task be th, and the past time of the task
be tp . Then the time limit state of the task was calculated
by formula: 100() /tltp thth
 .
Session sets (S): the corresponding relations of users,
roles and tasks.
Object sets (O): the objects that were accessed and
controlled.
Operation sets (OP): the minimum actions that ac-
complished some function to the controlled objects such
as a query of data. The sets of operations which would
not influence databases were recorded as OPN. And the
sets of operations which would influence databases were
recorded as OPE.OP OPN OPE
, OPN OPE
.
Constraint sets (C): a series of constraint conditions in
which constraints of task-role assignments, constraints of
object-operation assignments and other constraints were
included.
Permission sets (P): the sets of authorized operations
to objects. .
POpO
Security Policy sets (SP): the sets of security policies
of users.
Definition2. MT-object assignments (MTOA): the cor-
responding relationship of manufacture tasks and objects.
M
TOAMT O.
Definition3. User-MT assignments (UMTA): the cor-
responding relationship of users and manufacture tasks.
.
UMTAU MT
Definition4. User-role assignments (URA): the corre-
sponding relationship of users and roles. .
URAU R
Definition5. Role-operation assignments (ROpA): the
corresponding relationship of roles and operations.
.
ROpAR Op
Definition6. Hierarchical relations of roles (RH): the
relations of roles’ hierarchy which were showed in Fig-
ure 4..
RHR R
Definition7. MT-workflow assignments (MTW): the
corresponding relationship of manufacture tasks and
workflows.
M
TWMT W.
The access control model based on manufacture tasks,
roles and time limits was constructed in definition 1.
Some elements (such as MT, Tl, etc.) were extended on
the basis of traditional RBAC. Therefore access authori-
zation assignment would be adjusted based on manufac-
ture tasks, roles, correlation degrees and time limits,
when conflicts appeared. And matching operations to
Copyright © 2009 SciRes JSSM
KE ZHOU, MIN LV, GANG WANG, BINGYIN REN
112
Figure 4. Hierarchy of roles
objects were reduced because of the relationship of ob-
jects, tasks, users and their roles. Then the efficiency of
access control was increased.
5. Implementation Mechanisms for Access
Control Model
As it described in Figure 5, access to manufacturing
process would be controlled by following the steps as
below after users log in the system.
Step 1: Get user’s operation right ropa, corresponding
security policy sp, authorized access object and task state
tl according to definitions from 1 to 5 after task state and
role of the user is identified automatically by the system.
Step 2: Start access matching mechanism based on
manufacturing tasks, role and time limit to compute case
similarity S.
Step 3: Compare maximum of case similarity (Max S)
with ideal matching factor S0. Users’ permission would
be obtained by reusing the corresponding access case if
Max SS0. Compute users’ priorities p by implementing
authorization assignment mechanism based on manufac-
ture tasks, roles and time limits if Max SS0.
Step 4: Generate access interface or windows with
object lists, operation menus and function buttons ac-
cording to p.
Step 5: Requirement for user’s operation is sent from
client to server, such as process checking, task editing,
software calling and so on.
Step 6: Judge whether software/document is needed or
not. Go to step 7 if it is, else go to step 11.
Step 7: Judge whether calling overruns the limit or not
if it needs to call software. Judge whether the file is be-
ing edited or not if it needs to call document. The XML
based access control for transaction security and integrity
would be started if it is. Go to step 8 if it is not.
Step 8: Operations on objects are executed by users.
Step 9: Both access object and operation right of the
user was released after the operation was sent from client
to server.
Step 10: Go to step 4 if other objects will be visited.
Exit the system if all operations are completed.
Step 11: Judge if user’s operations need to edit data in
database. Go to step 12 if it does. Go to step 8 if it does
not.
Step 12: The XML based access control for transac-
tion security and integrity will be started if the data are
being edited. Go to step 8 if they are not.
Figure 5. Access control for manufacturing process in net-
worked manufacturing environment
Copyright © 2009 SciRes JSSM
KE ZHOU, MIN LV, GANG WANG, BINGYIN REN113
5.1 Access Case Matching Strategy Based on
Manufacture Tasks and Time Limits
Splitting of manufacturing process and merging of
manufacturing tasks becomes more complicated as users
increase in networked manufacturing platform. Then the
calculation of access assignment is increasing with geo-
metric series. That makes the efficiency of access control
decrease. According to the characteristics of sufficient
access cases and high reusability, the access case match-
ing strategy based on manufacture tasks and time limits
was implemented in order to assign access authorization
quickly and increase the efficiency of access control for
manufacturing process.
History of authorization assignments and access con-
trol cases was saved in databases as instance to provide
references for next assignment. Weighted retrieval algo-
rithmic based on similarity was adopted to search useful
instances more rapidly and exactly.
Characteristic expression of access cases A was A(Ci).
The format of Ci (characteristic sets) was {C1, C2,…, Cn},
Ci (1 i n) meant a certain characteristic, such as role
type, time limit state, task state, etc. Every characteristic
had two parameters, characteristic value (pi) and weight
value (qi). Suppose there were two access cases P1 and P2,
their characteristic expression were A1(Ci1) and A2(Ci2)
(1 i n) . Then the calculation formula of the dissimi-
larity D(A1, A2) was as below.
12
121 2
nn
1
12
i=1 i=1
D (A,A)=
n
ii
ii
i
ii
qq
pp
qq

Then the calculation formula of the similarity S(A1, A2)
was as below.
12
12 1212
nn
1
12
i=1 i=1
S (A,A)=1D (A,A)=1
n
ii
ii
i
ii
qq
pp
qq


Then, .
12
0S (A,A)1
Users’ permission would be obtained by reusing the
corresponding access case if Max SS0. Users’ priorities
p would be computed by implementing authorization
assignment mechanism based on manufacture tasks,
roles and time limits if Max SS0.
5.2 Authorization Assignment Mechanism Based
on Manufacture Tasks, Roles and Time Limits
Authorization assignment mechanism based on manu-
facture tasks, roles and time limits would be started when
similarity degrees between new case and each of the
cases in the database did not satisfy ASP manager which
meant Max SS0. The rules listed below were followed
in the authorization assignment.
Rule1. Permission was computed by p=(o,op) accord-
ing to definition 1 – 5. And it was composed of access
objects (o) and corresponding operations (op). Where,
access object (o) was obtained by the task which was
executed by the user (umta) and MT-object assignments
(mtoa), and corresponding operation (op) was obtained
by the role of user (ura) and role-operation assignments
(ropa).
Rule2. Operations which would not influence data-
bases were opened to all the authorized users.
Rule3. The edit authorization was assigned to one user
in one task in the same time.
Rule4. The edit authorization was assigned to the task
first which was in the active state, when the same data
was called by different tasks.
Rule5. The edit authorization was assigned to the task
first which was in the exigent state, when the same data
was called by different tasks which were all in the active
state.
Rule6. The edit authorization would be canceled and
assigned to the next user whose task was in the active
state automatically when tasks, roles, or the roles to
execute the task overran the limit of time.
Rule7. A user would be allowed to delete only if all
correlative tasks were in the terminative state or revoca-
tory state.
Rule8. A role would be allowed to delete only if the
correlative user set was empty.
5.3 XML Based Access Control for Transaction
Security and Integrity
5.3.1 Two-Level Detection Architecture of
Transaction Conflict
XML based access control for transaction security and
integrity is based on the transaction conflict detection.
We designed a kind of two-level detection architecture of
transaction conflict to find the conflicts both in applica-
tion and in the database. The detection architecture is
showed in Figure 6.
The application or data would be locked when a con-
flict is detected in order to assure the security and integ-
rity of transaction. Resolution mechanism of access con-
flicts would be started when the access sequence should
be adjusted. The mechanism was based on role’s type,
correlation degree, manufacture task state and its time
Copyright © 2009 SciRes JSSM
KE ZHOU, MIN LV, GANG WANG, BINGYIN REN
114
Figure 6. Two-level detection architecture of transaction
conflict
limit in order to coordinate operations of users and re-
solve the access conflicts. The core of the mechanism was
how to evaluate users’ priorities, and how to adjust their
authorities according to the priority sequence. Suppose
there the users in some access to manufacturing process
were U={u1, u2,…, un}, then the factor aggregate which
will influence the priority of access degree was X={x1, x2,
x3, x4}={ types of access, related degree of access object,
task state, time limit state }. Quantization of priority
factors, calculation of priority factor and steps of conflict
resolution were included in the resolution mechanism.
5.3.2 XML-Based Security Standards
Several attempts are being made to ensure security over
the Internet, especially for Web services. These ap-
proaches are XML-based, message-level security solu-
tions, and can also be used for manufacturing process
services based on Web services.
Confidentiality. When a sender transmits XBRL and
XARL documents to a recipient through the Internet, the
documents remain confidential. That is, only the sender
and intended recipient can read the message.
Integrity. When a sender transmits XBRL and XARL
documents to a recipient through the Internet, the docu-
ments have not been changed. In other words, XBRL and
XARL documents received by the intended recipient are
exactly the same as the documents transmitted by the
sender.
Authentication. When XBRL and XARL documents
are received by a user or system, the sender and receiver
are who they claim to be. Non-repudiation When XBRL
and XARL documents are sent to a receiver, the sender
cannot later deny having sent the documents, and vice
versa, the recipient cannot deny having received the
documents.
Authorization (Access control). Only authorized us-
ers are able to access the XBRL and XARL documents.
Key management. Encryption is used to maintain
confidentiality of information transmitted over the Inter-
net. Encryption involves the use of private and/or public
cryptographic “keys” to encipher transmissions. It is
important to ensure proper creation, storage, use, and
destruction of each cryptographic key. Audit trails are
also needed to trace user accesses and actions. They also
can be used to ensure system integrity through verifica-
tion.
Security enforcement mechanism. Financial service
providers can define a security policy with varying privi-
leges and enforce it across various platforms. Audit trails
Audits trails are a series of records of system events such
as user accesses and user activities. Audit trails can en-
hance user accountability by tracing the user’s activities,
to reconstruct system events after a problem has occurred,
to monitor problems, and to detect system intrusion.
6. Application of the System and Analysis of
Cases
A prototype system of access control for manufacturing
process in networked manufacturing environment was
developed based on principles above. And it was applied
in a steam turbine factory. Distributed computing archi-
tecture, Browser/ Server mode and J2EE structure crite-
rion were adopted in this system considering some fac-
tors in networked manufacturing environment such as
region and security. There were four layers in this system,
client layer, interface expression layer, business logic
layer and data service layer. The interface of messaging
suspended operation to users was showed in Figure 7.
7. Conclusions
The proposed access control model of manufacturing
process in networked manufacturing environment and
the implementation mechanisms were applied in devel-
oping the access control system. The system was verified
by the application in a networked collaborative design
and manufacture platform of steam turbine factory. The
results showed that the access conflicts were resolved by
the implementation of mechanisms for the access control
model, in which the access case matching strategy based
on manufacture tasks and time limits, the authorization
assignment mechanism based on manufacture tasks,
roles, correlation degrees and time limits, XML based
access control for transaction security and integrity were
included. The results also indicated that by using the
method the users’ operations in the allied enterprises
were coordinated, the resource configuration conflicts
were reduced, and the resource utilization rate was in-
creased. At the same time the efficiency of access control
for manufacturing process was increased, and the manu-
facturing cycle time was shortened.
Copyright © 2009 SciRes JSSM
KE ZHOU, MIN LV, GANG WANG, BINGYIN REN
Copyright © 2009 SciRes JSSM
115
Figure 7. Interface of messaging suspended operation to users
REFERENCES [10] C. Liang, T. Y. Xiao, L. X. Zhang, “Access control for
collaborative environment in networked manufacturing
system,” Computer Integrated Manufacturing Systems,
Vol. 13, No. 1, pp. 136-140, 152, 2007.
[1] Y. S. Fan, “Connotation and key technologies of net-
worked manufacturing,” Computer Integrated Manufac-
turing Systems, Vol. 9, No. 7, pp. 576-582, 2003. [11] T. Bray, J. Paoli, and C. M. Sperberg-McQueen (Eds),
“Extensible Markup Language (XML) 1.0 (2nd Ed.),”
W3C Recommendation, October 2000.
[2] P. Ward and C. L. Smith, “The development of access
control policies for information technology systems,”
Computers & Security, Vol. 21, No. 4, pp. 356-371, 2002. [12] R. Sandhu, E. J. Conyne, H. Lfeinstein, and C. E. You-
man, “Role based access control models,” IEEE com-
puter, Vol. 29, No. 2, pp. 38-47, 1996.
[3] C. P. Pfleger, “Security in computing,” 2nd Edition, Pren-
tice-Hall International Inc., Englewood Cliffs, NJ, 1997.
[13] W. H. Chen, X. C. Yin, B. Mao, and L. Xie, “A task and
role-based access control model for web,” Journal of
Computer Research and Development, Vol. 41, No. 9, pp.
1466-1473, 2004.
[4] S. Oh and S. Park, “Task-role-based access control model,”
Information Systems, Vol. 28, pp. 533-562, 2003.
[5] J. Hwang, K. Wu, and D. Liu, “Access control with role
attribute certificates,” Computer Standards & Interfaces,
Vol. 22, pp. 43-53, 2000. [14] Extensible Markup Language (XML) 1.0-W3C Recom-
mendation 10-Feb-98.
Http://www.w3.org/TR/1998/REC-xml-19980210.
[6] J. Deng and F. Hong, “Task-based access control model,”
Journal of Software, Vol. 14, No. 1, pp. 76-82, 2003. [15] N. N. Vuong, G. S. Smith, and Y. Deng, “Managing secu-
rity policies in a distributed environment using eXtensible
Markup Language (XML) ,” SAC, pp. 405-411, 2001.
[7] T. Xin and I. Ray, “A lattice-based approach for updating
access control policies in real-time,” Information Systems,
Vol. 32, pp. 755-772, 2007. [16] V. Kapsalis, L. Hadellis, D. Karelis, and S. Koubias, “A
dynamic context-aware access control architecture for
e-services,” Computers & Security, Vol. 25, pp. 507-521,
2006.
[8] S. Fu and C. Z. Xu, “Coordinated access control with
temporal and spatial constraints on mobile execution in
coalition environments,” Future Generation Computer
Systems, Vol. 23, pp. 804-815, 2007. [17] C. A. Ardagna, E. Damiani, S. De Capitani di Vimercati,
and P. Samarati, “XML-based access control languages,”
Information Security Technical Report. Vol. 9, No. 3, pp.
1363-4127, 2004.
[9] H. X. Cai, T. Yu, and M. L. Fang, “Access control of
manufacturing grid,” Computer Integrated Manufacturing
Systems, Vol. 13, No. 4, pp. 716-720, 2007.
KE ZHOU, MIN LV, GANG WANG, BINGYIN REN
116
[18] C. Lu, X. J. Hu, C. L. He, etc., “Oracle 10g DBA,” Pub-
lishing House of Electronics Industry, January 2007.
[19] L. Y. Wan, “Project of a VPD design based on role access
control in Oracle,” Journal of Jiangxi Institute of Education
(Comprehensive), Vol. 28, No. 3, pp. 33-36. 2007.
[20] L. Yao, and H. Z. Chen, “Oracle HTML DB application
with virtual private database,” System Simulation Tech-
nology, Vol. 2, No. 4, pp. 244-248, 2006.
[21] A. L. Zhong and F. H. Xu, “A method of using manage-
ment of role to enhance the security of ORACLE data-
base,” Journal of Chengdu University (Natural Science
Edition), Vol. 26, No. 3, pp. 225-227, 2007.
[22] K. Zhou, X. X. Wen, G. Wang, M. Lv, and Y. Q. Gong,
“Key technologies of manufacturing information system
management supporting networked manufacturing,” IEEE
International Conference on Engineering, Services and
Knowledge Management (the Management track of
WiCom 2007), Shanghai, China, pp.6240-6243, Sep-
tember 23-25, 2007.
Copyright © 2009 SciRes JSSM