期刊文献+

几种基于角色的代理授权模型特征比较 被引量:3

Features Analysis and Comparison of Role-Based Delegation Models
下载PDF
导出
摘要 基于角色访问控制(RBAC)被普遍认为是当前最具有发展潜力的访问控制策略。RBAC模型通过角色将用户和权限相联系,极大降低了授权管理的复杂性,解决了具有大量用户和权限分配的系统中管理复杂性问题。基于角色的代理授权模型是基于角色的访问控制研究的一个热点。文中对现有的几种基于角色的代理授权模型进行了比较研究,系统分析了它们的优缺点及其差异,对基于角色的代理授权模型研究和应用有一定的参考价值。 Role-based access control (RBAC) has been generally accepted as one of the most promising access control policies.In RBAC,access rights are associated with roles,and users are assigned appropriate roles thereby acquiring the corresponding permissions.RBAC is a well-known solution for decentralized permissions administration.Role-based delegation model (RDM) is a hotspot of RBAC research.In this paper,several typical role-based delegation models are analyssed,and the difference between them are also presented.It has some value for studying and implementation of the role-based delegation models.
出处 《微机发展》 2004年第11期126-129,共4页 Microcomputer Development
基金 国家自然科学基金资助项目(90204012) 陕西师范大学重点科研项目(2002995105)
关键词 访问控制 角色 代理粒度 代理深度 代理策略 access control role delegation granularity delegation depth delegation policy
  • 相关文献

参考文献10

  • 1Sandhu R,Coyne E,Feinstein H,et al.Role-Based Access Control Models[J].IEEE Computer,1996,29(2):38-47.
  • 2Sandhu R,Bhamidipati V,Coyne E,et al.The ARBAC97 model for role-based administration of roles: Preliminary description and outline[A].In Proceedings of 2nd ACM Workshop on Role-Based Access Control[C].NY USA:ACM Press,1997.41-50.
  • 3Sandhu R,Bhamidipati V,Munawer Q.The ARBAC97 Model for Role-Based Administration of Roles[J].ACM Transactions on Information and System Security,1999,2(1):41-50.
  • 4Ferraiolo D,Sandhu R.A Proposed Standard for Role Based Access Control[J].ACM Transactions on Information and System Security,2001,4(3):25-29.
  • 5Sandhu R.Future Directions in Role-Based Access Control Models[A].In:Gorodetski V I.Proc of the Mathematical Methods,Models,and Architectures for Network Security Systems[C].Lecture Notes in Computer Science 2052.Berlin:Springer,2001.22-26.
  • 6Zhang Longhua,Ahn Gail-Joon,Chu Bei-Tseng.A rule-based Framework for Role-Based Delegation[J].ACM Transactions on Information and System Security,2003,6(3):404-441.
  • 7Barka E,Sandhu R.Frame work for Role-Based Delegation Models[A].Proc of 16th Annual Computer Security Application Conference.IEEE Computer Society[C].Washington,DC,USA:[s.n.],2000.168-176.
  • 8Barka E,Sandhu R.A Role-Based Delegation Model and Some Extensions[A].Proc.of 23rd National Information Systems Security Conference[C].Baltimore,MD,USA:NIST,2000.101-114.
  • 9Zhang Xinwen,Oh S,Sandhu R.PBDM:A Flexible Delegation Model in RBAC[A].SACMAT[C].Como,Italy:[s.n.],2003.149-157.
  • 10赵庆松,孙玉芳,孙波.RPRDM:基于重复和部分角色的转授权模型[J].计算机研究与发展,2003,40(2):221-227. 被引量:32

二级参考文献11

  • 1Ravi S Sendhu. Future directions in role-based access control models. In: Vladimir I Gorodetski et al eds. Proc of the Mathematical Methods, Models, and Architectures for Network Security Systems. Lecture Notes in Computer Science 2052.Berlin: Springer, 2001. 22~26
  • 2Ravi S Sandhu et al. Role-based access control models. IEEE Computer, 1996, 29(2): 38~47
  • 3Sylvia L Osbom et al. Configuring role-based access control to enforce mandatory and discretionary access control policies.TISSEC, 2000, 3(2): 85~106
  • 4Gail-Joon Ahn, Ravi S Sandhu. The RSL99 language for rolebased separation of duty constraints. The 4th ACM Workshop on RBAC, Fairfax, Virginia, United States, 1999
  • 5Ravi S Sandhu, Venkata Bhamidipati et al. The ARBAC97 model for role-based administration of roles. TISSEC, 1999, 2(1): 105~135
  • 6David F Ferraiolo, Ravi Sandhu. A proposed standard for rolebased access control. ACM Trans on Information and System Security, 2001, 4(3): 25~29
  • 7Trusted solaris operating environment: http://www.sun.com/software/solaris/trustedsolaris/
  • 8LoUAnna Notargiacomo. Role-based access control in ORACLE7and Trusted ORACLE7. The 1st ACM Workshop on RBAC,Gaithersburg, Maryland, United States, 1995
  • 9Longhua Zhang et al. A rule-based framework for role-based delegation. The ACM Symp on Access Control Models and Technologies (SACMAT), Chantilly, VA, 2001
  • 10E Barka, R Sandhu. Framework for role-based delegation models.The 16th Annual Computer Security Applications Conf, New Orleans, Louisiana, 2000

共引文献31

同被引文献32

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部