期刊文献+

一种改进的以基于角色的访问控制实施BLP模型及其变种的方法 被引量:30

An Improved Method to Enforce BLP Model and Its Variations in Role-Based Access Control
下载PDF
导出
摘要 该文指出了Sandhu等人提出的以基于角色的访问控制 (Role BasedAccessControl,RBAC)实施强制访问控制 (MandatoryAccessControl,MAC)策略的方法存在拒绝服务 (DenialofService ,DoS)和给主体赋予过多权限等错误 ,且缺乏对经典BLP模型的充分的支持 .为此作者提出了一种改进的方法———ISandhu方法 ,引入了辅助角色层次 ,加强了角色间关系并提供了对可信主体概念的支持 .此方法修正了原有方法的错误 ,在RBAC中实施了经典的BLP模型及其变种模型以满足实际需求 ,保证了强制访问控制策略的正确实施 ,为在大量商业系统中以较小的代价引入强制访问控制提供了理论依据 . The existing classical method of enforcing BLP model in Role-based Access Control (RBAC) model presented by Sandhu et al. is researched and analyzed. Some errors of it are revealed, such as denial of service, over many privileges may be granted to the subjects, etc. Additionally, it also lacks of enough support to the classical BLP model. An improved method called ISandhu method is presented; it introduces assistant role hierarchies, strengthens role relations, and provides the support to the notation of trusted subject. Based on this method, the mistakes of the original method are revised and the classical BLP model and some variations of it are enforced in RBAC to meet the practical requirements. As results, the exact enforcement of mandatory access control (MAC) in RBAC is guaranteed and the theoretical foundation for adopting MAC in a large amount of commercial systems with small cost is offered.
出处 《计算机学报》 EI CSCD 北大核心 2004年第5期636-644,共9页 Chinese Journal of Computers
基金 国家"八六三"高技术研究发展计划项目基金 (2 0 0 2AA14 10 80 ) 国家自然科学基金 (60 0 73 0 2 2 60 3 73 0 5 4) 中国科学院知识创新工程项目基金 (KGCX1 0 9)资助
关键词 BLP模型 ISandhu方法 辅助角色层次 BLP模型 强制访问控制策略 访问控制 RBAC 信息安全 role-based access control BLP model mandatory access control role hierarchy trusted subject
  • 相关文献

参考文献13

  • 1Sandhu R., Coyne E.J., Feinstein H.L.,Youman C.E.. Role-based access control model. IEEE Computer, 1996, 29(2): 38~47
  • 2Bell D., LaPadual L.J..Secure computer system: Unified exposition and MULTICS interpretation. MITRE Corporation, Bedford, Mass: Technical Report MTR-2997, 1976
  • 3Lin T.. Bell and LaPadula Axioms: A "new" paradigm for an "old" model. In: Proceedings of the 1992~1993 ACM SIGSAC New Security Paradigms Workshop, Little Compton, 1993, 82~93
  • 4Bell D.. Secure computer systems: A network interpretation. In: Proceedings of the 2nd Aerospace Computer Security Conference, McLean, 1986, 32~39
  • 5Smalley S., Fraser T.. A security policy configuration for the security-enhanced Linux. NAI Labs, Technical Report, 2001
  • 6Mayer F.. An interpretation of a refined Bell-La padula model for the TMach kernel. In: Proceedings of the 4th Aerospace Computer Security Conference, Orlando, FL, 1988, 368~378
  • 7Sandhu R.. Role activation hierarchies. In:Proceedings of the 3rd ACM Workshop on Role-based Access Control, FariFax, 1998, 33~40
  • 8Sandhu R.. Role hierarchies and constraints for lattice-based access controls. In: Proceedings of Computer Security--ESORICS 96, Rome, 1996, 65~79
  • 9Osborn S., Sandhu R., Munawer Q.. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, 2000, 3(2): 85~106
  • 10Sandhu R.. Lattice-based access control models. IEEE Computer,1993, 26(11):9~19

同被引文献217

引证文献30

二级引证文献174

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部