期刊文献+

基于用户群组RBAC模型的一种实现方法 被引量:3

Realizing the Model of RBAC Based on Group with the EJB-CMP/CMR
下载PDF
导出
摘要 在基于角色的访问控制中 ,只有角色具有权限 ,用户必须被赋予某种角色才能取得相应的访问权限 ,通过引入群组 ,把各个不同的用户具有相同的角色集归为同一用户群组 ,对多个用户授权压缩为对同一群组授权 ,减少了授权工作量。采用 J2 EE平台中的 EJB- CMP/ CMR技术 ,CMR为基于群组的 RBAC模型的实现提供了很好的支持 。 In role-based control (RBAC), roles have the permissions. A user must be granted one of the roles to acquire the corresponding access right. Through introducing group, we can sort different users who owned the same role into a group and give right to this group instead of having different users with individual right. In this way, it can lessen the workload. We implemented this mode by the technology of EJB-CMP/CMR in J2EE platform.
出处 《武汉理工大学学报》 EI CAS CSCD 2004年第10期70-73,共4页 Journal of Wuhan University of Technology
基金 教育部重点实验室开放研究基金 (TKL J0 2 0 3)
关键词 基于角色控制 群组 EJB—CMP/CMR role based control(RBAC) group EJB-CMP/CMR
  • 相关文献

参考文献6

  • 1Sandhu R S,Coyne E J,Youman C E.The NIST Model for Role-based Access Control[A].Proceedings of the First ACM Workgroup on the Role-based Access Control[C].Berlin:ACM,1996.19~30.
  • 2Ferriaolo D,Cugini J,Kuhn R. Ro1e Based Access Control(RBAC):Features and Motivations[A].Proceedings of 11th Annual Computer Security Application Conference[C].New Orleans:LA,1995.241~248.
  • 3施景超,孙维祥,许满武.基于角色的存取控制及其实现[J].计算机应用研究,2000,17(6):13-15. 被引量:48
  • 4潘德锋,徐少平,梁庆中,吴信才.基于操作的MIS多级授权模型的实现[J].计算机应用,2003,23(z1):100-102. 被引量:17
  • 5Rick Hightower. Introduce EJB-CMP/CMR[DB/OL].http://www-900.ibm.com/developerWorks/cn/cnedu.nsf/java-onlinecourse-bytitle/introduce-cmp-cmr.shtml,2002-06-04/2004-03-16.
  • 6陈娟娟,胡金柱,谢亚玲.用户群组在RBAC模型中的应用[J].计算机应用,2003,23(2):64-67. 被引量:9

二级参考文献12

  • 1杨义先.网络信息安全与保密[M].北京:北京邮电大学出版社,1998..
  • 21,D. Ferraiolo, J. Cugini, and D.R.Kuhn. Role Based Access Control: Features and Motivations. In Annual Computer Security Applications Conference. IEEE Computer Society Press, 1995
  • 32,D. Richard Kuhn. Mutual Exclusion of Roles As a Means of Implementing Separation of Duty in Role-Based Access Control Systems National Institute of Standards and Technology. Gaithersburg, Maryland 20899
  • 43,E. B. Fernandez and J. C. Hawkins. Determing Role Rights from Use Cases. ACM97
  • 54,J. F. Berkley. Comparing Simple Role Based Access Control Models and Access Control Lists. NIST. Gaithersburg, MD 1997
  • 65,Observations on the Real-World Implementation of Role-Based Access Control. http://www.schumannsoftware.com/.
  • 7[5](美)佚名.网络最高安全技术指南[M].王锐,等译.北京:机械工业出版社,1998.
  • 8吴应良.管理信息系统的安全问题与对策研究[J].计算机应用研究,1999,16(11):22-25. 被引量:31
  • 9朱虹,冯玉才,吴永英.基于用户-角色的安全管理[J].华中理工大学学报,2000,28(4):23-25. 被引量:15
  • 10蔡菁.基于角色的数据库权限管理[J].微型电脑应用,2000,16(8):24-26. 被引量:14

共引文献69

同被引文献15

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部