期刊文献+

整合RBAC和TBAC的访问控制模型的研究及其在电子政务系统中的应用

On Access Control Model Combining RBAC with TBAC & Its Application in E-Govern ment System
下载PDF
导出
摘要 本论文研究整合基于角色与基于任务的访问控制模型及其在电子政务系统中的应用。基于角色的访问控制模型(Role-BasedAccessControl,简称RBAC)缺乏实际应用中工作流程的体现,所以本论文以RBAC为基础,结合了强调工作流程的基于任务的访问控制模型(Task-BasedAccessControl,简称TBAC),提出一种新的整合型访问控制模型,并以其在电子政务系统中的实际应用为例分析说明了该模型解决职责分离、工作顺序和工作相依性问题的具体策略。 The dissertation is dedicated to a new model based on Role-based Acce ss Control (RBAC) and Task-based Access Control (TBAC) and its application in E- government management information system. RBAC is lacking in the w orkflow concept. So the dissertation is dedicated to a new access control model which combines RBAC with TBAC and its application in E-government, and analyzes the policy of the mo del to resolve the problem about the role assignment operation and the r ole control, the workflow order and the workflow dependency.
作者 刘宏
出处 《宜宾学院学报》 2005年第6期39-42,共4页 Journal of Yibin University
关键词 访问控制 角色 RBAC 任务 TBAC 电子政务 Access Control Role RBAC Task TBAC E-government
  • 相关文献

参考文献10

  • 1[1]John Barkley, Konstantin Beznosov and Jinny Uppal, "Supporting Relationship in Access Control Using Role Based Access Control" in Proceedings of ACM Role-Based Access Control Workshop, Fairfax, Virginia, USA, 1999, pp. 55-65.
  • 2[2]Ravi S.Sandhu,Edward J.Coyne,Hal L.Feinstein and Charles E.Youman.Role-Based Access Control Models.IEEE Computer. Volume 29,Number 2,February 1996.
  • 3[3]Gail-Joon Ahn,Ravi Sandhu,Myong Kang,Joon Park. Injecting RBAC to secure a Web-based workflow system. Proceedings of the fifth ACM workshop on Role-based access control. Berlin,Germany. ACM Press,2000.
  • 4[4]R. K. Thomas and R. S. Sandhu, "Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management", Proceesings of the IFIP Workshop on Database Security, Lake Tahoe, California, 1997.
  • 5[5]Thomas RK, Sandhu RS. Task-Based authorization: a research project in next-generation active security models for workflows. In: NSF Workshop on Workflow and Process Automation in Information Systems: State-of-the-Art and Future Directions. 1996.
  • 6[6]Coulouris G, Dollimore J, Roberts M. Role and task-based access control in the PerDiS groupware platform. In: Proceedings of the ACM Workshop on Role-Based Access Control. George Mason University, 1998. 115-121.
  • 7[7]Thomas RK, Sandhu RS. Towards a task-based paradigm for flexible and adaptable access control in distributed applications. In: Proceedings of the 1992-1993 ACM SIGSAC New Security Paradigms Workshops. 1993. 138-142.
  • 8叶锡君,许勇,吴国新.基于角色的访问控制在Web中的实现技术[J].计算机工程,2002,28(1):167-169. 被引量:50
  • 9聂伯敏,熊桂喜.分布式环境下基于角色访问控制的实现[J].计算机工程,2002,28(8):181-183. 被引量:19
  • 10乔颖,须德,戴国忠.一种基于角色访问控制(RBAC)的新模型及其实现机制[J].计算机研究与发展,2000,37(1):37-44. 被引量:75

二级参考文献9

  • 1Chang C C,Inform Sci,1997年,96卷,1-2期,15页
  • 2Hw ang M S,Computers Security,1996年,15卷,1期,73页
  • 3Hw ang M S,IEICE Trans Inf Syst,1994年,77卷,9期,1042页
  • 4Hwang J J,Computer J,1992年,35卷,1期,16页
  • 5Ferraiolo D F,Barkley J F,Kuhn D R.A Role Based Access Control Model and Reference Implementation Within a Corporate Intranet ACM Transactions on Information Systems Security, 1999-02
  • 6Gavrila S I, Barkley J F. Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management. Third ACM Workshop on Role-based Access Control, 1998
  • 7Sandhu R, Coyne E J,Feinstein H L,et al. Role-based Access Control Models. IEEE Computer, 1996,29(2)
  • 8谭凯军,诸鸿文.身份鉴别与访问控制的集成方案[J].小型微型计算机系统,1999,20(10):760-762. 被引量:3
  • 9鞠海玲,宁洪,郑若忠,陈怀义,孙庭凯.分布式数据库系统的安全机制[J].计算机工程与应用,2000,36(3):98-100. 被引量:17

共引文献139

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部