期刊文献+

基于角色的权限分配和管理中的方法 被引量:12

Ways of Distributing and Administering Privilege Based on Role
下载PDF
导出
摘要 对当前权限系统设计过程中的主要权限分配方法进行介绍和比较,发现它们各自的灵活性和适用性不一样,并着重讨论了基于角色的访问控制模块,分析了RBAC模型中用户、角色与操作权限之间的关系。在此基础上,提出了一种应用于办公自动化系统中较安全的操作权限的实现思想,通过分析提出了五种可行的操作权限分配过程中的解决方法,并评价了各自的优点与不足。 Introduces and compares several primary ways of distributing privileges during current designing privilege system, and finds that these methods are very flexible and their applicabilities are also different. A role-based access control module is discussed by analysing the relations among user,role and privilege, and brings up one idea of realizing secure designing privilege system applied in OA. At last gives five methods of resolving manipulating permission, and compares their merits and disadvantages among them.
出处 《微机发展》 2004年第12期65-66,82,共3页 Microcomputer Development
关键词 权限控制 角色 用户组 access control role user group
  • 相关文献

参考文献6

二级参考文献23

  • 1[1]Ravi S Sandhu, et al. Role-Based Access Control Models[J].Computer IEEE, 1996,29 (2): 38-47.
  • 2[2]Matthew J Moyer, Mustaque Ahamad. Generalized Role-Based Access Control [J]. Proceedings-International Conference on Distributed Computing Systems, 2001, (4): 391-398.
  • 3[3]Sandhu R S,et al. Role-Based Access Control: A Multi-dimensional View[J]. Annual Computer Security Applications Conference, 1994, (12) :54-62.
  • 4[1]Sandhu R, Coyne E, Feinstein H, et al. Role-based access control model[J]. IEEE Computer, 1996,29(2):38-47.
  • 5[2]Sandhu R, Ferraiolo D, Kuhn R. The NIST model for role-based access control: Towards a unified standard[Z]. The Fifth ACM Workshop on Role-Based Access Control, Berlin, 2000.
  • 6[3]Sandhu R, Munawer Q. The ARBAC99 model for administration of roles[EB/OL]. http:∥www.list.gmu.edu/conference-papers.htm,2000-11-01/2001-03-08.
  • 7[4]Goh C, Baldwin A. Towards a more complete model of role[Z]. The Third ACM Workshop on Role-Based Access Control, Fairfax, VA, 1998.
  • 8[5]Moffett D, Lupu C. The uses of role hierarchies in access control[Z]. 4th ACM Workshop on RBAC, Fairfax, VA,1999.
  • 9[6]Osborn S, Sandhu R, Munawer Q. Configuring role-based access control to enforce mandatory and discretionary access control policies[J]. ACM Transactions on Information and System Security, 2000,3:85-106.
  • 10[1]Bell D, Padula L. Secure computer systems: unified exposition and MULTICS: [Report ESD-TR-75-306]. The MITRE Corporation, Bedford, Massachusetts, March 1976

共引文献133

同被引文献57

引证文献12

二级引证文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部