期刊文献+

TRDM——具有时限的基于角色的转授权模型 被引量:26

TRDM-Temporal Role-Based Delegation Model
下载PDF
导出
摘要 当前基于角色的系统的完全依赖于管理者的集中式管理方式 ,不能够满足分布环境下的系统管理的需求 基于角色的转授权模型 (role baseddelegationmodel,RDM )更适于分布式环境的授权管理 ,但当前的几种授权模型都不支持时限 (temporary)和授权宽度 基于时限和授权宽度等方面 ,对RDM 2 0 0 0 (role baseddelegationmodel 2 0 0 0 )模型进行了扩充 ,提出了完备的具有时限的基于角色的转授权模型 (temporalrole baseddelegationmodel,TRDM ) ,并提出了新的基于TRDM的角色授权和角色撤销 (revocation) It's the system manager with authorization role who handles assignments of users to roles in role-based systems. However,the central management,which fully depends on the manager,isn't suitable for distributed environments. Role-based delegation model (RDM) is more suitable for distributed environments. But current role-based delegation models don't support temporal delegation and delegation width. A temporal role-based delegation model called TRDM is presented,which is an extension of RDM2000 by supporting temporal delegation and delegation width. New mechanisms of role delegation and role revocation are explored,which is based on TRDM.
出处 《计算机研究与发展》 EI CSCD 北大核心 2004年第7期1104-1109,共6页 Journal of Computer Research and Development
基金 国家"八六三"高技术研究发展计划项目 ( 863 3 0 6 ZD12 14 2 ) 国家自然科学基金项目 ( 60 0 73 0 2 2 ) 中国科学院知识创新工程项目(KGCX1 0 9)
关键词 信息安全 访问控制 转授权 时限 基于角色 information security access control delegation temporal role-based
  • 相关文献

参考文献17

  • 1Ravi S Sandhu.Future directions in role-based access control models.Mathematical Methods,Models and Architectures for Computer Networks Security,St Petersburg,2001
  • 2Ravi S Sandhu,Edward J Coyne,Hal L Feinstein,et al.Role-based access control models.IEEE Computer,1996,29(2):38~47
  • 3Sylvia L Osborn,Ravi S Sandhu,Qamar Munawer.Configuring role-based access control to enforce mandatory and discretionary access control policies.ACM Trans on Information and System Security,2000,3(2):85~106
  • 4Gail-Joon Ahn,Ravi S Sandhu.The RSL99 language for role-based separation of duty constraints.ACM Workshop on Role-Based Access Control,Fairfax,Virginia,USA,1999
  • 5Ravi S Sandhu,Venkata Bhamidipati,Qamar Munawer.The ARBAC97 model for role-based administration of roles.ACM Trans on Information and System Security,1999,2(1):105~135
  • 6David F Ferraiolo,Ravi Sandhu.A proposed standard for role-based access control.ACM Trans on Information and System Security,2001,4(3):25~29
  • 7Sun Microsystems Company.Trusted Solaris Operating Environment.http://wwws.sun.com/software/solaris/trustedsolaris/features.html,2003
  • 8LouAnna Notargiacomo.Role-based access control in Oracle 7 and trusted Oracle 7.The 1st ACM Workshop on Role-Based Access Control,Gaithersburg,Maryland,United States,1995
  • 9Joon S Park,Ravi S Sandhu.RBAC on the Web by smart certificates.In:Proc of the 4th ACM Workshop on Role-Based Access Control.New York:ACM Press,1999.1~9
  • 10Joon S Park,Ravi S Sandhu,SreeLatha Ghanta.RBAC on the Web by Secure Cookies.International Federation for Information Processing the 13th Int'l Conf on Database Security,Deventer,Washington,1999

同被引文献189

引证文献26

二级引证文献80

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部