期刊文献+

一种考虑用户可信度的动态RBAC模型 被引量:2

A Dynamic RBAC Model Considering User Reliability
下载PDF
导出
摘要 基于角色的访问控制(RBAC)是一种广泛应用的授权访问控制方式。但传统的RBAC模型既没有给出控制角色指派的方法,也不能保证角色许可最少优先原则。该文针对传统RBAC系统中存在的上述缺陷,通过引入用户可信度和角色实例的概念,提出了一种考虑用户可信度的动态RBAC模型,给出了模型执行过程。 The role-based access control (RBAC) is an authorization access control mode applied widely. But the traditional RBAC model does not give the method to control the role assignment and it cannot assure the least priority of the role's permission. During to the limitations of the traditional RBAC system, this article introduces the conception of users' reliability and roles instance to bring forward a dynamic RBAC model considering the users' reliability, It also gives the executing process of the model.
作者 苏玮 曾广周
出处 《计算机工程》 CAS CSCD 北大核心 2005年第15期84-86,共3页 Computer Engineering
基金 山东省自然科学基金资助项目(Y2001G03) 山东省科学技术发展计划基金资助项目(031110123)
关键词 访问控制 角色 角色实例 用户可信度 Access control Role Role instance User reliability
  • 相关文献

参考文献4

  • 1李成锴,dislab.nju.edu.cn,詹永照,茅兵,谢立.基于角色的CSCW系统访问控制模型[J].软件学报,2000,11(7):931-937. 被引量:55
  • 2洪帆,何绪斌,徐智勇.基于角色的访问控制[J].小型微型计算机系统,2000,21(2):198-200. 被引量:43
  • 3Sandhu R,Coyne E,Feinstein H,et al.Role-Based Access Control Models.Computer,1996,29(2):38-47
  • 4Tenday J M K,Quisquater J J,Lobelle Q M.Deriving a Role-based Access Control Model from the OBBAC Model.Enabling Technolo-gies:Infrastructure for Collaborative Enterprises,In:Proceedings of IEEE 8th International Workshops,1999-06:141-151

二级参考文献7

  • 1Zahir T,IEEE Internet Computing,1997年,1卷,5期,24页
  • 2茅兵,中国科学.E,1997年,27卷,6期,542页
  • 3Shen Honghai,Proceedings of thACMCSCW’92 Conference on Computer Supported Cooperative Work,1994年,51页
  • 4.
  • 5D. D Clark,and D. R Wilson.A Comparison of commercial and military computer security policies[].IEEE Symposium on Computer Security and Privacy.1987
  • 6.Integrity in Automated Information Systems[]..1991
  • 7茅兵,谢立.基于对象的协同计算模型[J].中国科学(E辑),1997,27(6):542-547. 被引量:5

共引文献96

同被引文献29

  • 1孙锴,夏雨人.在.NET环境中开发日志功能的研究[J].计算机工程,2004,30(B12):574-575. 被引量:5
  • 2沈海波,洪帆.访问控制模型研究综述[J].计算机应用研究,2005,22(6):9-11. 被引量:87
  • 3周文峰,尤军考,何基香.基于RBAC模型的权限管理系统设计与实现[J].微计算机信息,2006(05X):35-36. 被引量:25
  • 4Ferraiolo D F, Sandhu R, Gavrila S, et al. ProPosed NIST standard for rolebased access control[J]. ACM Transasctions on Information and System Security, 2001,4(3):224-274.
  • 5Mui L, Mohtashemi M, Halberstadt A. A computational model of trust and reputation[C]// Proceedings of the 35th Annual Hawaii International Conference on System Sciences. 2002:2431-2439.
  • 6Li N. Discretionary access control[J]. Encyclopedia of Cryptography and Security, 2011:353-356.
  • 7Lindqvist H. Mandatory access control[D]. Umea University, 2006.
  • 8Yuan E, Tong J. Attributed based access control (ABAC) for Web services[C]// 2005 IEEE International Conference on Web Services. 2005:561-569.
  • 9Ferraiolo D F, Cugini J A, Kuhn D R. Rolebased access control (RBAC): Features and motivations[C]// Proceedings of the 11th Annual Computer Security Application Conference. 1995:241-248.
  • 10Park J, Sandhu R. The UCON ABC usage control model[J]. ACM Transactions on Information and System Security, 2004,7(1):128-174.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部