期刊文献+

基于角色的多级文档安全访问控制模型设计 被引量:4

Multilevel Document Access Control Model Based on RBAC
下载PDF
导出
摘要 该文针对实际应用中的需求 ,尤其是军队信息管理系统中对文档管理的需求 ,指出了基于角色的存取控制 (Role—BasedAccessContro1,RBAC)模型在军队信息管理中的不足 ,提出了一种新的基于角色的多级文档安全访问控制模型。这种新的模型不但给每个用户分配角色 ,给每个文档也分配角色 ,而且给每个用户和文档分配密级 (权限 ) ,并且在ACL表中存储着特殊情况的更改 ,然后通过比较角色的层次和密级 ,以及和ACL结合判断 ,达到存取控制的目的。 Aiming at the particular requirement of document management of military information systems , we analyze the limitation of the existing models of RBAC, and prompt a new multilevel document access control model based on RBAC. In the new mode, we not only assign different roles to different users and different documents, but also give them different secret level (permission), and store the especial instances's alteration in ACL. Based on comparing the hierarchy and secret level of every role , and combining with ACL , we can carry the point of access control.The fulfillment indicates that this model can meet the requirement of real application of military information management system.
作者 高磊 詹毅
机构地区 成都理工大学
出处 《计算机仿真》 CSCD 2005年第2期70-73,共4页 Computer Simulation
关键词 存取控制 密级 角色树 Access control Secret level Role tree
  • 相关文献

参考文献7

  • 1施景超,孙维祥,许满武.基于角色的存取控制及其实现[J].计算机应用研究,2000,17(6):13-15. 被引量:48
  • 2Ravi S Sandhu, Edward J Coyne, Hal L Feinstein, Charles E Youman. Role-based access control models [J]. IEEE Computer,1996,29(2):38-47.
  • 3Zahir Tari, Shun-Wu Chan. A role-based access control for intranet security[J]. JEEE Internet Computing. 1997,1 (5) :24 - 34.
  • 4R Sandhu, V Bhamidipati, Q Munawer. The ARBAC97 model for role- based administration of roles[J]. ACM Transaction in Information and Systems Security 2,1999 - 1.105 - 135.
  • 5R Sandhu, D Ferraiolo, R Kuhn. The NIST Model for Role- Based Access Control: Towards A Unified Standard[C] .In Proceedings of Sth ACM Workshop on Role- Based Access Control. ACM, Berlin,Germany, July 26 - 28,2000.
  • 6M J Moyer, M Ahamad. Generalized Role - based Access Control[J]IEEE, 2001.1063 - 6927.
  • 7Matthew J Moyer, Mustaque Ahamad. Generalized Role - Based Access Control [C] . Proceedings - International Conference on Distributed Computing System, 2001, (4): 391 - 398.

二级参考文献5

  • 11,D. Ferraiolo, J. Cugini, and D.R.Kuhn. Role Based Access Control: Features and Motivations. In Annual Computer Security Applications Conference. IEEE Computer Society Press, 1995
  • 22,D. Richard Kuhn. Mutual Exclusion of Roles As a Means of Implementing Separation of Duty in Role-Based Access Control Systems National Institute of Standards and Technology. Gaithersburg, Maryland 20899
  • 33,E. B. Fernandez and J. C. Hawkins. Determing Role Rights from Use Cases. ACM97
  • 44,J. F. Berkley. Comparing Simple Role Based Access Control Models and Access Control Lists. NIST. Gaithersburg, MD 1997
  • 55,Observations on the Real-World Implementation of Role-Based Access Control. http://www.schumannsoftware.com/.

共引文献47

同被引文献33

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部