期刊文献+

扩展的基于角色访问控制模型的设计 被引量:1

Design of Extended Role-Based Access Control Model
下载PDF
导出
摘要 协作系统的动态特性要求特定访问主体能够在安全监控下自主地进行访问主体角色关系配置 在研究开发的扩展的基于角色访问控制模型的基础上 ,应用对象建模方法对模型应用的关键问题提出了解决方案 ,包括一致性问题、动态监控、约束处理、安全控制等 该研究为扩展的角色的访问控制模型的实际应用提供指导 ,它可以应用到大型复杂系统 ,特别适用于动态协作系统 ,结合认证技术 。 Collaborative work system requires specific users being able to assign some other system users to specific roles under the control of system. We developed an authorization supported role-based access control model named ASRBAC to satisfy this requirement. In order to realize this model in real world, this paper discusses some important problems which are critical to model the realization using object-oriented methodology, including consistency problem, dynamic monitor, constraint management and security control. This model can be applied in large-scale systems, especially large collaborative work system. Integrated with authentication technology, it can protect information security in large systems.
出处 《计算机辅助设计与图形学学报》 EI CSCD 北大核心 2004年第6期838-844,共7页 Journal of Computer-Aided Design & Computer Graphics
基金 国防科技重点实验室基金和总装备部"十五"预研项目资助
关键词 UML 对象 基于角色访问控制 授权 UML object role-based access control authorization
  • 相关文献

参考文献7

  • 1Sandhu R, Coyne E. Role-based access control models[J]. IEEE Computer, 1996, 29(2): 38~47
  • 2Ferraiolo D, Sandhu R. Proposed NIST standard for role-based access control [J]. ACM Transactions on Information and System Security, 2001, 4(3):224~274
  • 3Lampson B W. Protection[A]. In: Proceedings of the 5th Symposium on Information Sciences and Systems, Princeton, 1971. 437~443
  • 4Bell D E, LaPadula L J. Secure Computer Systems: Mathematical Foundations and Model [M]. Massachusetts: The MITRE Corp., 1973. 74~244
  • 5刘婷婷,汪惠芬,张友良.支持授权的基于角色的访问控制模型及实现[J].计算机辅助设计与图形学学报,2004,16(4):414-419. 被引量:9
  • 6严悍,张宏,许满武.基于角色访问控制对象建模及实现[J].计算机学报,2000,23(10):1064-1071. 被引量:58
  • 7刘润东.UML对象设计与编程[M].北京:北京希望电子出版社,2001..

二级参考文献11

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2Yan Han,ACM SIGSOFT Software Engineering Notes,2000年,25卷,2期,64页
  • 3Dewan D,ACM Transactions Computer Human Interaction,1998年,5卷,1期,34页
  • 4Sandhu R, Coyne E. Role-based access control models[J]. IEEE Computer, 1996, 29(2): 38~47
  • 5Ferraiolo D, Sandhu R. Proposed NIST standard for role-based access control[J]. ACM Transactions on Information and System Security, 2001, 4(3): 224~274
  • 6Sandhu R, Bhamidipati V. The ARBAC97 model for role-based administration of roles[J]. ACM Transactions on Information and System Security, 1999, 2(1): 105~135
  • 7Gavrila S, Barkley J. Formal specification for role based access control user/role and role/role relationship management[A]. In: Proceedings of the 3rd ACM Workshop on Role-Based Access Control, Virginia, 1998. 81~90
  • 8Ferraiolo D, Barkley J. A role based access control model and reference implementation within a corporate Intranet[J]. ACM Transactions on Information and System Security, 1999, 2(1): 34~64
  • 9Barka E, Sandhu R. Framework for role-based delegation models[A] In: Proceedings of the 16th Annual Computer Security Application Conference, New Orleans, LA, 2000. 168~176
  • 10李成锴,dislab.nju.edu.cn,詹永照,茅兵,谢立.基于角色的CSCW系统访问控制模型[J].软件学报,2000,11(7):931-937. 被引量:55

共引文献115

同被引文献14

  • 1Kemmerer Richard A, Vigna Giovanni, Intrusion detection: a brief history and overview [J]. IEEE Computer, 2002, 35(4) : 27-30
  • 2Sengupta S, Card B, Kadam S W, et al Towards data mining temporal patterns for anomaly intrusion detection systems [C] //Proceedings of the 2nd IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, Lviv, Ukraine, 2003:205-209
  • 3Navarro Kuri J. Fast multipattern search algorithms for intrusion detection [C] //Proceedings of the 7th International Symposium on String Processing Information Retrieval, Curufia, 2000:169-180
  • 4Cha ByungRae, Vaidya B, Seungio Han. Anomaly intrusion detection for system call using the soundex algorithm and neural networks [C] //Proceedings of the 10th IEEE Symposium on Computers and Communications, Cartagena, 2005:427-433
  • 5Mukkamala Srinivas, Sung Andrew H, A comparative study of techniques for intrusion detection [C] //Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence, Sacramento, CA, 2003:570-577
  • 6Ryutov Tatyana, Neuman Clifford, Kim Dongho, et al. Integrated access control and intrusion detection for Web servers [J]. IEEE Transactions on Parallel and Distributed Systems, 2003, 14(9): 841-850
  • 7Samarati Sandhu R S. Access control: principle and practice [J]. IEEE Communications Magazine, 1994, 32(9): 40-48
  • 8Lee Chain-Wu, Huang Chun-Hsi, Sanguthevar, et al. TROJAN: a sealable distributed semantic network system [ C] // Proceedings of the 15th IEEE International Conference on Tools with Axtificial Intelligence, Sacramento, CA, 2003:219-223
  • 9Giorgio Zanin, Luigi Vineenzo Maneini. Towards a formal model for security policies specification and validation in the selinux system [C] //Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, NewYork, 2004: 136-145
  • 10Ye N, Emran. S M, Chen Q, et al. Multivariate statistical analysis of audit trails for host-based intrusion detection [J]. IEEE Transactions on Computers, 2002, 51(7) : 810-820

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部