期刊文献+

多政策的两层协同应用存取控制模型 被引量:19

Multilevel Multi-policy Access Control Model for Collaborative Application
下载PDF
导出
摘要 总结了国内外存取控制研究 ,分析了目前基于角色的存取控制应用于协同系统时存在的一些问题 针对这些问题 ,给出了一个用于协同应用系统的存取控制框架 该框架包括两个子部件 :基本模型和角色模型 基本模型规定了操作权限之间的依赖关系以及如何进行操作权限比较 ,并将权限与对具体对象的操作相关联 ,使得该模型较为直观 此外只要系统中Broker的实现支持 ,该模型能够实现任意粒度级的存取控制 角色模型对RBAC96的角色概念重新给予了定义 ,将角色的允许集划分为三部分 :公共权限、私有权限和保护权限 角色允许集的划分使用户可以更加灵活地定义角色 ,方便地控制角色的私有信息不被其他角色所访问 。 An access control paradigm composed of basic model and role model is proposed for collaborative applications. Basic model specifies the relationship among privileges and the way of ranking privileges. It relates privilege with operationson the objects, so the model appears more straight forward. Moreover, if Brokers' implementation permits, the model can support any grained access control. Role model re-defines the role concept of RBAC96, divides the permissions of role into public permissions, protect permissions and private permissions. It allows user to define roles more flexibly, prevents private permissions of roles from being inherited and reduces the definition of ancillary roles.
出处 《计算机辅助设计与图形学学报》 EI CSCD 北大核心 2004年第4期420-426,共7页 Journal of Computer-Aided Design & Computer Graphics
基金 国家"八六三"高技术研究发展计划 ( 2 0 0 1AA415 2 2 0 )资助
  • 相关文献

参考文献10

  • 1Shen HongHai, Dewan P. Access control for collaborative environments[A]. In: Turner J, Kraut R, eds. Proceedings of the ACM CSCW'92 Conference on Computer Supported Cooperative Work[C]. New York: ACM Press, 1994. 51~58
  • 2Sandhu R S, Coyne E, Feinstein H L, et al. Role-based access control models[J]. IEEE Computer, 1996, 29(2): 38~47
  • 3Sandhu Ravi S. Lattice-based access control models[J]. IEEE Computer, 1993, 26(11): 9~19
  • 4乔颖,须德,戴国忠.一种基于角色访问控制(RBAC)的新模型及其实现机制[J].计算机研究与发展,2000,37(1):37-44. 被引量:75
  • 5李成锴,dislab.nju.edu.cn,詹永照,茅兵,谢立.基于角色的CSCW系统访问控制模型[J].软件学报,2000,11(7):931-937. 被引量:55
  • 6韩伟力,陈刚,尹建伟,董金祥.权限约束支持的基于角色的约束访问控制模型与实现[J].计算机辅助设计与图形学学报,2002,14(4):333-338. 被引量:19
  • 7Bertino Elisa, Ferrari Elena, Buccafurri Francesco. Pasquale rullo: A logical framework for reasoning on data access control policies[A]. In: Proceedings of the 12th Computer Security Foundations Workshop, Mordano, Italy, 1999. 175~189
  • 8Edwards W Keith. Policies and roles in collaborative applications[A]. In: Proceedings of the 1996 ACM Conference on CSCW, Cambridge, MA, 1996. 11~20
  • 9Li Du, Muntz Richard R. Runtime dynamics in collaborative systems[A]. In: Proceedings of ACM SIGGROUP'99 International Conference on Supporting Group Work, Phoenix, Arizona, 1999. 336~345
  • 10钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91

二级参考文献16

  • 11,Ferraiolo D F, Kuhn R. Role-Based access control. In: Proceedings of the 15th National Computer Security Conference. Baltimore, MD, 1992. 554~563, http://hissa.ncsl.nist.gov/kuhn/
  • 22,Sandhu R, Samarati P. Access control: principles and practice. IEEE Communications, 1994,32(9):40~48
  • 33,Ramaswamy C, Sandhu R. Role-Based access control features in commercial database management systems. In: Proceedings of the 21st National Information Systems Security Conference. Virginia: U.S. Government Printing Office, 1998, http://www.list.gmu.edu/conferen.htm
  • 44,Sandhu R, Coyne E J, Feinstein H L et al. Role-Based access control models. IEEE Computers, 1996,29(2):38~47
  • 55 Sandhu R. Rationale for the RBAC96 family of access control models. In: Proceedings of the 1st ACM Workshop on Role-Based Access Control. ACM, 1997. http://www.list.gmu.edu/conferen.htm
  • 6Chang C C,Inform Sci,1997年,96卷,1-2期,15页
  • 7Hw ang M S,Computers Security,1996年,15卷,1期,73页
  • 8Hw ang M S,IEICE Trans Inf Syst,1994年,77卷,9期,1042页
  • 9Hwang J J,Computer J,1992年,35卷,1期,16页
  • 10Zahir T,IEEE Internet Computing,1997年,1卷,5期,24页

共引文献209

同被引文献139

引证文献19

二级引证文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部