期刊文献+

适用于B/S结构的RBAC模型研究及实现 被引量:11

下载PDF
导出
摘要 主要研究了基于角色的访问控制面向B/S结构的扩展及实现。在RBAC96模型的基础 上,对安全对象进行了细分,引入了模块实体、方法实体及相应的角色传递关系,并将权限分割成普通 权限和特殊权限,提出了BSAC模型。然后结合基于MVC的安全框架给出了RBAC的实现。
作者 吴耀华 李宁
出处 《计算机应用》 CSCD 北大核心 2004年第B12期84-87,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(50175064)
  • 相关文献

参考文献2

二级参考文献25

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2D F Ferraiolo, R Kuhn. Role-based access control. The 15th National Computer Security Conf, Baltimore, MD, 1992. http://hissa.ncsl.nist.gov/kuhn
  • 3R S Sandhu et al. Role-based access control models. IEEE Computer, 1996, 29(2): 38~47
  • 4P Loscocco et al.The Inevitability of failure: The flawed assumption of security in modern computing environments, national security agency. The 21st National Information Systems Security Conf, Virginia, USA, 1997
  • 5David F Ferraiolo. An argument for the role-based access control model. The 6th ACM Symp on Access Control Models and Technologies, Chantilly, Virginia, USA, 2001
  • 6R Sandhu, P Samarati. Access control: Principles and practice. IEEE Communications, 1994, 32(9): 40~48
  • 7Feustel, Mayfield. The DGSA: Unmet information security challenges for operating system designers. Operating Systems Review, 1998, 32(1): 3~22
  • 8Research Challenges in Operating System Security, Arlington, Hilton: DARPA/ISO. 1997. http://www.ito.arpa.mil/Proceedings/OS_Security/challenges/challenges_long.html
  • 9J H Saltzer, M Schroeder. The protection and control of information sharing in multics. Communications of the ACM, 1974, 17(7): 388~402
  • 10J Hoffman. Implementing RBAC on type enforced systems. In: Proc of the 13th Annual Computer Security Applications Conf. San Diego, CA: IEEE Computer Society Press, 1997

共引文献10

同被引文献51

引证文献11

二级引证文献60

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部