The deficiencies of current access control techniques in solving the problems of manufacturing process access conflict in networked manufacturing environment were analyzed. An information model of manufacturing process was con-structed, and a case XML Schema of manufacturing task model was given. Based on the characteristic analysis of the access control for the information model, an improved access control model of manufacturing process was constructed, and the access control model based on manufacture tasks, roles and time limits and the relationships among the ele-ments were defined. The implementation mechanisms for access control model were analyzed, in which the access case matching strategy based on manufacture tasks and time limits, the authorization assignment mechanism based on manufacture tasks, roles, correlation degrees and time limits, XML based access control for transaction security and integrity were included. And the two-level detection architecture of transaction conflict was designed to find the con-flicts both in application and in the database. Finally the prototype system was developed based on these principles. Feasibility and effectiveness of the method were verified by an enterprise application.
[A. L. Zhong and F. H. Xu, “A method of using manage-ment of role to enhance the security of ORACLE data-base,” Journal of Chengdu University (Natural Science Edition), Vol. 26, No. 3, pp. 225-227, 2007.
K. Zhou, X. X. Wen, G. Wang, M. Lv, and Y. Q. Gong, “Key technologies of manufacturing information system management supporting networked manufacturing,” IEEE International Conference on Engineering, Services and Knowledge Management (the Management track of WiCom 2007), Shanghai, China, pp.6240-6243, Sep-tember 23-25, 2007.