期刊文献+

一种改进的RBAC模型的研究与应用 被引量:2

Research and Application of an Improved Role-Based Access Control Model
下载PDF
导出
摘要 在分析传统基于角色的访问控制(RBAC)模型的基础上,对模型增加了角色继承约束和时间约束,增大了复杂系统中角色的粒度,提高了模型对复杂角色关系的适应性,实现了用户多级授权,并使得模型能够随时间动态变化,最后给出其在实际系统中的应用实例,从而进一步论证了其合理性和实用性。 On the basis of analyzing the conventional RBAC model, presents an improved RBAC model with role- inherited constraint and time constraint. The improved RBAC model has better applicability to the complex role relations than conventional RBAC model, and it has the character of changing with the time. Finally, its application in a PM system is illustrated, which proves the model's reasonability and practicability.
出处 《微机发展》 2005年第8期95-97,共3页 Microcomputer Development
关键词 基于角色的访问控制 角色继承约束 角色时间约束 RBAC role-inherited constraint time constraint
  • 相关文献

参考文献6

  • 1Sandhu R, Coyne E, Feinstein. Role- based Access Control Model[J]. IEEE Computer, 1996,29 (2): 38 - 47.
  • 2Schaad A. The Role- based Access Control System of a European Bank [A]. Sixth ACM Symposium on Access Control Models and Technologies[C]. Chantilly, VA USA: ACM,2001.87 - 96.
  • 3Sandhu R. Issues in RBAC[A]. In: Youman C, Sandhu R,Coyne E. Proceedings of the 1st ACM Workshop on Rolebased access control[C] . [s.l. ]: ACM Press, 1996. 21-24.
  • 4Sandhu R. Rational for the RBAC96 family of access control models[A]. Proceedings of the 1st ACM Workshop on Role - Based Access Control[C]. [s. l. ] :ACM, 1997.
  • 5吕宜洪,宋瀚涛,龚圆明.政府机关公文流转系统访问控制基本框架及改进的RBAC模型研究[J].计算机应用研究,2003,20(1):31-34. 被引量:4
  • 6黄建,卿斯汉,温红子.带时间特性的角色访问控制[J].软件学报,2003,14(11):1944-1954. 被引量:72

二级参考文献14

  • 1[1]Sandhu R,Coyne E,Feinstein. Role-based Access Control Model[J].IEEE Computer,1996,29(2):38-47.
  • 2[2]Sandhu R,Munawer Q. The ARBAC99 Model for Administration of Roles[EB/OL]. http://www.list.gmu.edu/conferencepapers.htm,2001-03-08.
  • 3[3]Sandhu R,Ferraiolo D,Kuhn R. The NIST Model for Role-based Access Control: Towards A Unified Standard[C].Berlin Germany:Proceedings of the fifth ACM Workshop on Role-based Access Control,July 2000.47-63.
  • 4[4]Glenn Faden. RBAC in UNIX Administration[C].Fairfax,VA USA:Proceedings of the Fourth ACM Workshop on Role-based Access Control,October 1999.95-101.
  • 5[5]Schaad A,et al.The Role-based Access Control System of a European Bank[C].Chantilly,VA USA:Sixth ACM Symposium on Access Control Models and technologies,May 2001.3-9.
  • 6[6]Swift M. Improving the Granularity of Access Control in Win-dows NT[C]. Chantilly,VA USA:Sixth ACM Symposium on Access Control Models and Technologies,May 2001.87-96.
  • 7[7]Sandhu R,Bhamidipati V. An Oracle Implementation of the PRA97 Model for Permission-role Assignment[C]. Fairfax,VA USA: third ACM Workshop on RBAC,October,1998,13-21.
  • 8Ferraiolo DF, Sandhu R, Gavrila S. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 2001,4(3):224-274.
  • 9Osbom S, Sandhu R. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, 2000,3(2):85-106.
  • 10AHN G-J, Sandhu R. Role-Based authorization constraints specification. ACM Transactions on Information and System Security, 2000,3(4):207-226.

共引文献73

同被引文献18

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部