期刊文献+

一种基于角色的访问控制扩展模型

An Expanded Role-Based Access Control Model
下载PDF
导出
摘要 基于角色访问控制(RBAC)被普遍认为是当前最具有发展潜力的访问控制策略,已成为信息安全等领域研究的热点之一。文中在经典RBAC96模型的基础上,引入组用户和事务权限的概念,提出了一种扩展RBAC模型ERBAC,它能够有效降低授权管理复杂度,提高基于角色的访问控制效率。文中给出模型的形式化定义和授权规则,然后以基于校园网的教务管理信息系统为背景,对ERBAC模型的应用方法进行了讨论。 Role-based access control (RBAC) has been generally accepted as one of the most promising access control policies, and it has become a hot research topic in the area of information security. By introducing the group user(GU) and transaction permission(TP),a new extended role-based access control model(ERBAC) is presented on the basis of classical RBAC96, the extended model will effectively reduce complication of authorization and improve efficiency of RBAC.A formal definition and the rule of authorization of the new model are introduced,then according to the JWGL Intranet,its application is studied.
出处 《微机发展》 2004年第12期73-75,105,共4页 Microcomputer Development
基金 国家自然科学基金资助项目(962204012) 陕西师范大学重点科研基金资助项目(2002995105)
关键词 基于角色的访问控制 角色 组用户 事务权限 RBAC role group user transaction permission
  • 相关文献

参考文献5

  • 1Sandhu, Coyne E, Feinstein H, et al. Role - Based Access Control Models[ J ]. IEEE Computer, 1996,29 (2): 38 - 47.
  • 2Sandhu R, Ferraiolo D, Kuhn R. The N IST model for role based access control:Towards a unified standard[ A]. In:Proc.of 5th ACM Workshop on Role-Based Access Control[C].USA:ACM,2000.60-110.
  • 3冯德民,王小明,赵宗涛.一种扩展角色存取控制模型[J].计算机工程与应用,2003,39(3):87-89. 被引量:16
  • 4Sandhu R,Bhamidipati V,Munawer Q.The ARBAC97 Model for Role - Based Administration of Roles[A]. In: Proc. of 1st ACM Transactions on Information and System Security[ C].USA:ACM,1999. 105- 135.
  • 5陈娟娟,胡金柱,谢亚玲.用户群组在RBAC模型中的应用[J].计算机应用,2003,23(2):64-67. 被引量:9

二级参考文献10

  • 1[1]Sandhu R,Ferraiolo D,Kuhn R.The NIST model for role-based access control:towards a unified standdard[C].In:Proceeding of 5th ACM Workshop on Role-Based Access Control,ACM,Berlin,Germany,2000-07
  • 2[2]Sylvia Osborn,Ravi Sandhu,Qamar Munawer. Configuring role-based access control to enforce mandatory and discretionary access control policies[J].ACM Transactions on Information and System Security,2000;3(2)
  • 3[3]Sandhu R,Coyne E J,Feinstein H L et al. Role-baseed access control model[J].IEEE Computer,1996;29(2)
  • 4[4]Ravi Sandhu. Role activation hierarehies[C].In:Proceedings of 3rd ACM Workshop on Role-Based Access Control,ACM,Fairfax,1998-10
  • 5[5]Ravi Sandhu,Edward J Coyne,Hal L Feinstein et al. Role-based access control models[J].IEEE Computer, 1996;29(2):38~47
  • 6[6]Gail-Joon Ahn,Ravi Sandhu. The RSL99 language for role-based separation od duty constraints[C].In:proceedings of 4th ACM Workshop on Role-Based Access Control, Fairfax, VA, 1999-10:43~54
  • 7[7]Ravi Sandhu,Venkata Bhamidipati,Qamar Munawer. The ARBAC97 model for role-based administration of roles[J].ACM Transactions on Information and system Security, 1999;2(1):105~135
  • 8[8]J Widom,S Ceri eds. Active database systems:Triggers and rules for advanced database proceeding[M].Morgan Kaufmann Pulishers,1995
  • 9朱虹,冯玉才,吴永英.基于用户-角色的安全管理[J].华中理工大学学报,2000,28(4):23-25. 被引量:15
  • 10施景超,孙维祥,许满武.基于角色的存取控制及其实现[J].计算机应用研究,2000,17(6):13-15. 被引量:48

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部