期刊文献+

面向任务的RBAC扩展模型研究 被引量:3

Study of the extended model for task oriented RBAC
下载PDF
导出
摘要 针对RBAC模型的普通角色继承所存在权限不能及时的授予与回收、没有包含明确的策略状态以及没有反映元素状态的改变等问题,给出了一个面向任务的RBAC扩展模型RBAC-T,该模型引入了任务概念并将任务划分成公有任务和私有任务,通过部分角色继承P-RH,控制了角色权限继承粒度,解决了传统RBAC角色继承中出现的继承问题,给出状态变换图及模型状态变化的描述,通过对状态的分析控制实现了权限的动态分配与回收.还描述了模型的实现原型和处理流程. Aiming at the problems in Role-Based Access Control(RBAC) model such as granting and reclaiming of authorities of common role, not having distinctive policy state, and not reflecting the change of elements state, RBAC-T, the extended model for the task-oriented RBAC, was put forward. In this model the conception of task was introduced, group tasks were divided into public tasks and private tasks, and the granularity of role inheritance through partial role inheritance was introduced. States transition graphics and descriptions of states transition of the model dynamic allocation and reclaim of authorities were implemented by states analysis. The transaction procedure of the model and its prototype were provided.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2005年第8期34-36,共3页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
关键词 基于角色的访问控制 任务 RBAC-T 访问控制策略 role-based access control task RBAC task access control policy
  • 相关文献

参考文献4

  • 1Sandhu R S, Coyne E J, Feinstein H L, et al. Role-based access control models[J]. IEEE Computer, 1996,29(2) : 38-48.
  • 2Oh S, Park S. Task-role-based access control model[J].Information Systems, 2003, 28(6): 533-562.
  • 3陈丽侠,陈刚,董金祥.基于任务的工作流访问控制模型和实现框架[J].计算机应用研究,2003,20(9):42-44. 被引量:12
  • 4Steinmuller B, Safarik K. Extending role-based access control model with states[A]. In: Sergio Verdu, eds.International Conference on Trends in Communications[C]. Brastislava, 2001. New York: IEEE Press,2001. 398-399.

二级参考文献5

  • 1R Sandhu, E Coyne, H Feinslein. Role-based Access Control Models[J]. IEEE Computer, 1996,29(2) :38-47.
  • 2Joon S Park, et al. A Secure Workflow System for Dynamic Collaboration[C]. Proc. of the 4^th ACM Workshop on Rote-based Access Control, 1999.83-94.
  • 3G-J Ahn,et al. Injecting RBAC to Secure a Web-based Workflow System[C]. Proceedings of 5th ACM Workshop on Role-based Access Control, ACM, Berlin, Germany, 2000.26- 28.
  • 4Botha Reinhardt A, et al. Access Control in Document-centric Workflow Systems: An Agent-based Approach [ J ]. Computers and Security,2001,20(6) :525-532.
  • 5R Sandhu, D Ferraiolo, et al. The NIST Model for Role-based Access Control:Towards an Unified Standard[C] .Proceedings of the 5^th ACM Workshop on Role-based Access Control (RBAC-00) ,2000.47-64.

共引文献11

同被引文献19

引证文献3

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部