location:Home > 2025 Vol.8 Jun.N03 > Automatic control method of access to update resources of financial information system

2025 Vol.8 Jun.N03

  • Title: Automatic control method of access to update resources of financial information system
  • Name: Michael William Jackson
  • Company: Bronte International University,USA
  • Abstract:

    When resources are updated in financial information system, the control performance of traditional automatic access control method is greatly affected by the external training environment. Aiming at this problem, a role-based automatic access control method of resource update in financial system is designed. A role-based hierarchical RBAC model is established, and the model structure, unified model relationship, direct trust and recommended trust of each role in the access model are designed in detail. After obtaining the role hierarchy, the overall trust of its is evaluated, and the security level and complete trust of access resources are obtained. The authority is recognized according to the role trust opening key, and the automatic access control of financial information system is realized. In order to verify the effectiveness of the method, the control value performance of the experimental test method is designed. The results show that compared with the two traditional methods, the design method has certain advantages in the total control implementation time and the control accuracy of the permission function under different training sets and test sets proportions.


  • Keyword: Financial information system; Resource update; Role level; Access rights; Automatic control; RBAC model
  • DOI: 10.12250/jpciams2025090601
  • Citation form: Michael William Jackson.Automatic control method of access to update resources of financial information system[J]. Computer Informatization and Mechanical System,2025,Vol.8,pp.1-4
Reference:

[1]CAO Z H, CAI X Z, GU M H, et al. Android permission management and control scheme based on access control list mechanism [J]. Journal of Computer Applications, 2019, 39 (11): 3316-3322.

[2]XIE J T. Simulation of access control method for laboratory update information resource [J]. Computer Simulation, 2019,36 (2): 435-438.

[3]AN X, XIA J W, YANG H J, et al. Discrete controller synthesis based resource management method of heterogeneous multi-core processor system [J]. Journal of Computer Applications, 2020, 40 (6): 1698-1706.

[4]LOU D G, LI R B, LIU B, et al. Access control method of virtualized resources in cloud computing data center [J]. Bulletin of Science and Technology, 2019, 35 (1): 169-172.

[5]YAN X C, CHEN Y, BA Y, et al. Updatable attribute-based encryption scheme supporting dynamic change of user rights [J]. Journal of Computer Research and Development, 2020, 57 (5): 1057-1069.

[6]CHEN G.  A comparative study of local electronic resource usage statistics system for resolving HTTPS access data [J]. Library and Information Service, 2019, 63 (14): 36-43.

[7]MA C Q, YAO J Y, HAN K, et al. A full resource predictive control approach to control systems subject to computational constraint [J]. Acta Automatica Sinica, 2019,45 (4): 730-738.

[8]WU L N, JIA Y X, DOU T F, et al. The practice and research of electronic resources access problems in new library service platform [J]. Library and Information Service, 2020, 64 (6): 20-26.

[9]Gulimire Erken, Nurmaimaimaiti Heilili. CP-ABE re-encryption based access control constraint for sensitive data [J]. Computer Engineering and Applications, 2020, 56 (18): 69-76.

[10]ZHANG Z L, ZHANG Y R, MA S X. Concurrent conflict control method of "Multi-rights+Operation Queues" based on CPN tools [J]. Journal of System Simulation, 2019,31 (6): 1092-1100.

[11]LIU A D, DU X H, WANG N, et al. Blockchain-based access control mechanism for big data [J]. Journal of Software, 2019,30 (9): 2636-2654.

[12]WANG X L, JIANG X Z, LI Y. Model for data access control and sharing based on blockchain [J]. Journal of Software, 2019,30 (6): 1661-1669.

[13]CHEN W, LI X P, JU J N. Research on user and permission management audit of information systems based on big data technology [J]. The Chinese Certified Public Accountant, 2019 (2): 74-79.

[14]MO C F, YUE H D, LI Z C, et al. Study on optimizing financial information system of public hospitals under government accounting system[J]. Chinese Health Economics, 2019, 38 (12): 90-93.

[15]ZHANG W L, GUO X, YANG K, et al. Design and implementation of a personnel information detection system for indoor environment control [J]. Journal of Beijing University of Technology, 2020, 46 (5): 456-465.

 


Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16