期刊文献+

基于角色的访问控制模型分析与系统实现 被引量:21

Analysis and Implementation of Role-Based Access Control Models
下载PDF
导出
摘要 介绍了三种访问控制机制:自主访问控制(DAC)、强制访问控制(MAC)和基于角色的访问控制(RBAC),并着重分析了RBAC的三种模型:RBAC96,EHRABC和ARBAC97。最后,给出了一个RBAC的实现模型。 This paper describes three access control mechanisms:Discretionary Access Control(DAC),Mandatory Access Control(MAC),Role-Based Access Control(RBAC),then emphatically analyses three RBAC models:RBAC96,EHRBAC,ARBAC97.Finally,an implementation model of RBAC is also presented.
出处 《计算机应用研究》 CSCD 北大核心 2004年第9期173-175,共3页 Application Research of Computers
关键词 RBAC ROLE RBAC96 EHRBAC ARBAC97 RBAC Role RBAC96 EHRBAC ARBAC97
  • 相关文献

参考文献10

二级参考文献14

  • 1KevinLoney 李晓军 等.Oracle8数据库管理员手册[M].北京:机械工业出版社,2000..
  • 21,D. Ferraiolo, J. Cugini, and D.R.Kuhn. Role Based Access Control: Features and Motivations. In Annual Computer Security Applications Conference. IEEE Computer Society Press, 1995
  • 32,D. Richard Kuhn. Mutual Exclusion of Roles As a Means of Implementing Separation of Duty in Role-Based Access Control Systems National Institute of Standards and Technology. Gaithersburg, Maryland 20899
  • 43,E. B. Fernandez and J. C. Hawkins. Determing Role Rights from Use Cases. ACM97
  • 54,J. F. Berkley. Comparing Simple Role Based Access Control Models and Access Control Lists. NIST. Gaithersburg, MD 1997
  • 65,Observations on the Real-World Implementation of Role-Based Access Control. http://www.schumannsoftware.com/.
  • 71,Ferraiolo D F, Kuhn R. Role-Based access control. In: Proceedings of the 15th National Computer Security Conference. Baltimore, MD, 1992. 554~563, http://hissa.ncsl.nist.gov/kuhn/
  • 82,Sandhu R, Samarati P. Access control: principles and practice. IEEE Communications, 1994,32(9):40~48
  • 93,Ramaswamy C, Sandhu R. Role-Based access control features in commercial database management systems. In: Proceedings of the 21st National Information Systems Security Conference. Virginia: U.S. Government Printing Office, 1998, http://www.list.gmu.edu/conferen.htm
  • 104,Sandhu R, Coyne E J, Feinstein H L et al. Role-Based access control models. IEEE Computers, 1996,29(2):38~47

共引文献252

同被引文献139

引证文献21

二级引证文献63

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部