期刊文献+

基于权限冲突的扩展权限管理方法 被引量:3

Management with Extended Authority Based on Authority Conflict
下载PDF
导出
摘要 权限管理是系统开发中一个非常重要的环节.在一般应用系统所要求的权限功能基础上提出了一种基于权限冲突的扩展权限管理方法,通过设立权限冲突机制,将具有冲突性质的权限构成冲突集合,并与其他一般权限有效地间隔开来,从而保障了系统的安全机制.在此基础上利用UML语言进行了实现,并成功地应用于应用系统开发中. Authority management is an important link in the management information system development. It works to solve conflict problem effectively. Based on the requirement of application system, a new extended authority management is provided to build sets with conflict functions to separate them from others, therefore, the system security is guaranteed. Furthermore, this new method has been implemented through unified modeling language (UML), and applied in some systems successfully.
出处 《长沙电力学院学报(自然科学版)》 2005年第1期55-58,共4页 JOurnal of Changsha University of electric Power:Natural Science
关键词 权限管理 统一建模语言 角色 authority management, unified modeling language (UML), role
  • 相关文献

参考文献4

二级参考文献18

  • 11,D. Ferraiolo, J. Cugini, and D.R.Kuhn. Role Based Access Control: Features and Motivations. In Annual Computer Security Applications Conference. IEEE Computer Society Press, 1995
  • 22,D. Richard Kuhn. Mutual Exclusion of Roles As a Means of Implementing Separation of Duty in Role-Based Access Control Systems National Institute of Standards and Technology. Gaithersburg, Maryland 20899
  • 33,E. B. Fernandez and J. C. Hawkins. Determing Role Rights from Use Cases. ACM97
  • 44,J. F. Berkley. Comparing Simple Role Based Access Control Models and Access Control Lists. NIST. Gaithersburg, MD 1997
  • 55,Observations on the Real-World Implementation of Role-Based Access Control. http://www.schumannsoftware.com/.
  • 6[1]Sandhu R,Ferraiolo D,Kuhn R.The NIST model for role-based access control:towards a unified standdard[C].In:Proceeding of 5th ACM Workshop on Role-Based Access Control,ACM,Berlin,Germany,2000-07
  • 7[2]Sylvia Osborn,Ravi Sandhu,Qamar Munawer. Configuring role-based access control to enforce mandatory and discretionary access control policies[J].ACM Transactions on Information and System Security,2000;3(2)
  • 8[3]Sandhu R,Coyne E J,Feinstein H L et al. Role-baseed access control model[J].IEEE Computer,1996;29(2)
  • 9[4]Ravi Sandhu. Role activation hierarehies[C].In:Proceedings of 3rd ACM Workshop on Role-Based Access Control,ACM,Fairfax,1998-10
  • 10[5]Ravi Sandhu,Edward J Coyne,Hal L Feinstein et al. Role-based access control models[J].IEEE Computer, 1996;29(2):38~47

共引文献197

同被引文献11

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部