期刊文献+

一个基于角色的信息流模型及应用 被引量:5

An Information Flow Model Based on Roles and Applications
下载PDF
导出
摘要 为了描述基于角色的访问控制模型(Role basedAccessControl(RABC))控制下的信息流动情况,扩充客体的概念,使用RABC的基本原理,利用客体拥有的角色集合来划分信息的安全类、两个客体的角色集合所具有的包涵关系来定义信息流策略。经严格的数学证明,新的信息流模型满足文献[3]的有限格和最小上界运算符性质,是合理的、安全的。最后给出了该模型的简单应用。 Role-based Access Control(RABC) is an important information security model. In order to describe the information flow based on this model, a new security information flow model based on roles is given. In this article, the object is expended, the basic principle of the RBAC model is used, the safe classify of the object is divided by its role set, and the information flow role is described with the included relation of the role set of two objects. By strict mathematical verification, this new information flow model satisfies the character of finite lattice and least upper bound operator in reference [3], and it is reasonable and safe.Lastly one simple application is given.
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 2004年第5期94-97,共4页 Journal of Sichuan University (Engineering Science Edition)
基金 国家973资助项目(1999035801) 四川省教育厅自然科学重点项目(2003A161)
关键词 RABC模型 信息流模型 RABC model secure information flow model Lattice
  • 相关文献

参考文献6

  • 1Bell D E,Lapadula L J.Secure compter system:mathematicalfoundation[R].MTR-2527,Mitrecorp,Bedford,MA,1973(NTIS AD-771543).
  • 2Biba K.Integrity considerations for secure computing systems[R].Mitre Report MTR-3153, Mitre Corporation, Bedford, MA, 1975.
  • 3Denning D E.A lattice model of secure information flow[J]. Commu ACM,1976,19(5):236-243.
  • 4Sandhu R S, Samarati P. Access control: principles and practice[J].IEEE Communications,1994,32(9):40-48.
  • 5Sandhu R S,Coyne E J,Feinstein H L. Role-based access control models[J].IEEE Computer,1996,29(2):38-47.
  • 6沈昌祥.构造积极防御的安全保障框架[J].计算机安全,2003(32):1-2. 被引量:12

共引文献12

同被引文献34

引证文献5

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部