期刊文献+

扩充角色层次关系模型及其应用 被引量:91

A Role Hierarchy Model for Role-Based Access Control and Its Application
下载PDF
导出
摘要 基于网络的大规模软件应用系统面临着日益复杂的数据资源安全管理的难题 .基于角色的访问控制方法 (role- based access control,简称 RBAC)实现用户与访问权限的逻辑分离和构造角色之间的层次关系 ,从而方便了数据的安全管理 .该文在 RBAC96模型的基础上 ,对角色之间的层次关系进行了扩充 ,定义了角色的公共权限和私有权限 ,引入了一般继承和扩展继承机制 ,形成了一个能描述复杂层次关系的角色访问控制模型EHRBAC(extended hierarchy role- based access control) .同时 ,应用该模型完成了石化市场信息数据库系统的安全管理 .EHRBAC模型可以简化角色层次关系 ,描述复杂的角色继承场景 ,并通过区分公共权限和私有权限来进一步实现最少权限原则 . One of the most challenging problems in managing large computer software systems on global network is the complexity of security administration. The RBAC (role based access control) method shows powerful capability on access control by realizing logical separation between users and permissions and constructing role hierarchies. This paper presents a role hierarchy model EHRBAC (extended hierarchy role based access control) based on RBAC96, which defines common permissions and private permissions and imports normal inheritance and extended inheritance. Based on EHRBAC, the authors realize the security administration for the Petrochemical Market Information System. The EHRBAC model can specify the complex inheritance of roles and simplify their relation hierarchies. It minimizes the role access permissions by the separation of private permissions from common permissions.
出处 《软件学报》 EI CSCD 北大核心 2000年第6期779-784,共6页 Journal of Software
基金 国家"九五"重点科技攻关项目基金!(No.97- 5 6 7) 国家 86 3高科技项目基金!(No.86 3- 30 6 - ZD0 2 - 0 1- 1) 国家自然科学基金!
关键词 角色 基于角色访问控制 继承 层次关系 Role, role-based access control, inheritance, hierarchy.
  • 相关文献

参考文献5

  • 11,Ferraiolo D F, Kuhn R. Role-Based access control. In: Proceedings of the 15th National Computer Security Conference. Baltimore, MD, 1992. 554~563, http://hissa.ncsl.nist.gov/kuhn/
  • 22,Sandhu R, Samarati P. Access control: principles and practice. IEEE Communications, 1994,32(9):40~48
  • 33,Ramaswamy C, Sandhu R. Role-Based access control features in commercial database management systems. In: Proceedings of the 21st National Information Systems Security Conference. Virginia: U.S. Government Printing Office, 1998, http://www.list.gmu.edu/conferen.htm
  • 44,Sandhu R, Coyne E J, Feinstein H L et al. Role-Based access control models. IEEE Computers, 1996,29(2):38~47
  • 55 Sandhu R. Rationale for the RBAC96 family of access control models. In: Proceedings of the 1st ACM Workshop on Role-Based Access Control. ACM, 1997. http://www.list.gmu.edu/conferen.htm

同被引文献523

引证文献91

二级引证文献387

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部