期刊文献+

一种改进的基于角色的委托模型 被引量:1

A Refined Role-Based Delegation Model
下载PDF
导出
摘要 文章在分析Barka和Sanhu提出的基于角色委托模型RBDM1基础上,针对它在处理委托关系方面引发的种种弊端,提出了一种改进模型。测试结果表明,改进的模型使得委托双方对委托关系唯一确定,并同时明确了委托责任。 On the basis of analyzing RBDM1 which was brought forward by Barka and Sanhu,this paper provides an improved model to solve the problem which is caused by delegation relation. The experiment result shows that the refined RBDM can make sure the only relation between delegatee and delegator, and at the same time it indicates the responsibility of delegation.
出处 《信息工程大学学报》 2005年第2期88-90,99,共4页 Journal of Information Engineering University
关键词 委托 继承 成员 私有角色 delegation hierarchy members private roles
  • 相关文献

参考文献4

  • 1Sanhu R S,Coyne E J,Feinstein H L,et al.Role-based Access Control Models[J].IEEE Computer,1996,29(2):38-47.
  • 2Barka E,Sandhu R.Framework for Role-based Delegation Models[A]. In Proceedings of 16th Annual Computer Security Application Conference[C].2000,12:168-176.
  • 3David F Fenaio1o,Ravi Sandhu, Serban Gavrila, et a1.Proposed NIST Standard for Role-Based Access Control[J].ACM Transactions on lnformation and System Security,2001 (4):224-274.
  • 4张绍莲,欧阳毅,杜鹏,谢俊元.角色层次关系的分析与研究[J].计算机科学,2002,29(3):72-74. 被引量:9

二级参考文献6

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2Ferraiolo D F,Cuginiand J,Kuhn D R.Role Based Access Control:Features and Motivations.In:Proc.of the 11th Annual Conf.on Computer Security Applications.1995
  • 3Sandhu R S,et al.Role-based Access Control:A Multi-Dimension View .In:Proc.of the 10th Annual Conf.on Computer Security Applications.1994
  • 4Sandhu R S,et al.Role-Based Access Control Models .IEEE Computer,1996,29(2):38~47
  • 5Sandhu R,et al.The ARBAC97 model for role-based administration of roles.ACM Transactions on Information and System Security,1999,2(1):105~ 135
  • 6Nyanchama M,Osborn S.The role graph model and conflict of interest.ACM Transactions on Information and System Security,1999,2(1):3~33

共引文献8

同被引文献5

  • 1徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 2Sandhu R, Coyne E J, Feinstein H L, et al. Role-Based access control models[J]. IEEE Computer, 1996, 29(2): 38-47.
  • 3Youman C, Sandhu R, Coyne E, et al. Rationale for the RBAC96 family of access control models[A]. In Proe. of the 1^st ACM Workshop on Role-Based Access Control[C]. New York: ACM Press, 1996.
  • 4Barka E, Sandhu R. A Role-based Delegation model and Some Extensions[A]. In Proc. of 23^rd National Information Systems Security Conference[C]. Baltimore: NISC, 2000.
  • 5Barka E, Sandhu R. Role-based Delegation Model/Hierarchical Roles(RBDM1)[A]. In Proc. of 20^th Annual Computer Security Applications Conference[C]. Tucson: IEEE Computer Society, 2004.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部