期刊文献+

基于RBAC模型的角色权限及层次关系研究 被引量:12

Research on Role Permission and Role Hierarchy Based on Role-based Access Control Model
下载PDF
导出
摘要 针对经典的RBAC96模型及相关模型中角色私有权限处理方法的不足之处,提出了一个改进的角色层次关系模型IHRBAC.该模型通过在角色权限委派关系中引入角色权限继承极限值和最大继承极限值,划分角色权限为私有权限和公有权限,定义私有化继承和公有化继承二种继承方式,形成了一个支持安全管理员宏观控制下的角色权限委派分级管理的改进模型,克服了多数模型集中式管理模式的局限性,并能够灵活地反映复杂的角色层次关系. According to the shortcoming of the classic RBAC96 model and its relative ones, an improved hierarchy role - based access control model IHRBAC is presented. By using the concepts of role - permission inheritance limit and extreme limit in the relation of role - permission assignment, the role permissions are divided into private permissions and public ones, and the concepts of privatizing inheritance and publicizing inheritance are defined. In IHRBAC model, the multi - level management of role - permission assignment can be used under the control of security manager, which can overcome the limitations of central administration mode in most RBAC models, and flexibly describe the more complicated role relationships. Key words: RBAC ; private permission ; permission inheritance ; role hierarchy
出处 《哈尔滨理工大学学报》 CAS 2005年第4期95-99,共5页 Journal of Harbin University of Science and Technology
关键词 基于角色的访问控制 私有权限 权限继承 角色层次关系 RBAC private permission permission inheritance role hierarchy
  • 相关文献

参考文献8

二级参考文献29

  • 1刘怀宇.基于角色的细粒度的访问控制系统的研究与实现[M].北京:北京航空航天大学计算机科学与工程系,1999..
  • 2[1]Sandhu R, Coyne E, Feinstein H, et al. Role-based access control model[J]. IEEE Computer, 1996,29(2):38-47.
  • 3[2]Sandhu R, Ferraiolo D, Kuhn R. The NIST model for role-based access control: Towards a unified standard[Z]. The Fifth ACM Workshop on Role-Based Access Control, Berlin, 2000.
  • 4[3]Sandhu R, Munawer Q. The ARBAC99 model for administration of roles[EB/OL]. http:∥www.list.gmu.edu/conference-papers.htm,2000-11-01/2001-03-08.
  • 5[4]Goh C, Baldwin A. Towards a more complete model of role[Z]. The Third ACM Workshop on Role-Based Access Control, Fairfax, VA, 1998.
  • 6[5]Moffett D, Lupu C. The uses of role hierarchies in access control[Z]. 4th ACM Workshop on RBAC, Fairfax, VA,1999.
  • 7[6]Osborn S, Sandhu R, Munawer Q. Configuring role-based access control to enforce mandatory and discretionary access control policies[J]. ACM Transactions on Information and System Security, 2000,3:85-106.
  • 81,Ferraiolo D F, Kuhn R. Role-Based access control. In: Proceedings of the 15th National Computer Security Conference. Baltimore, MD, 1992. 554~563, http://hissa.ncsl.nist.gov/kuhn/
  • 92,Sandhu R, Samarati P. Access control: principles and practice. IEEE Communications, 1994,32(9):40~48
  • 103,Ramaswamy C, Sandhu R. Role-Based access control features in commercial database management systems. In: Proceedings of the 21st National Information Systems Security Conference. Virginia: U.S. Government Printing Office, 1998, http://www.list.gmu.edu/conferen.htm

共引文献153

同被引文献63

引证文献12

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部