期刊文献+

分布式环境下基于角色的访问控制 被引量:6

Role Based Access Control in Distributed Environment
下载PDF
导出
摘要 本文通过扩展权限的定义:给权限增加一个标示位来区别主体、访问的客体属于相同域和属于不同域时的权限,这样解决了采用对等角色时授予给非本域主体过大权限的问题。同时主体在访问非本域的客体时可以申请临时角色,这样避免了仅仅采用对等角色去访问非本域客体的简单化,更有利于最小权限的实现。通过这两点的改进,使基于角色的访问控制模型更加适合分布式访问控制的特点。
出处 《计算机系统应用》 2005年第10期38-41,共4页 Computer Systems & Applications
基金 国家863项目资金资助:桌面操作系统及其配套环境 编号2002AA 1Z2101 2004AA1Z2020
  • 相关文献

参考文献5

二级参考文献12

  • 1[1]Sandhu R, Coyne E, Feinstein H, et al. Role-based access control model[J]. IEEE Computer, 1996,29(2):38-47.
  • 2[2]Sandhu R, Ferraiolo D, Kuhn R. The NIST model for role-based access control: Towards a unified standard[Z]. The Fifth ACM Workshop on Role-Based Access Control, Berlin, 2000.
  • 3[3]Sandhu R, Munawer Q. The ARBAC99 model for administration of roles[EB/OL]. http:∥www.list.gmu.edu/conference-papers.htm,2000-11-01/2001-03-08.
  • 4[4]Goh C, Baldwin A. Towards a more complete model of role[Z]. The Third ACM Workshop on Role-Based Access Control, Fairfax, VA, 1998.
  • 5[5]Moffett D, Lupu C. The uses of role hierarchies in access control[Z]. 4th ACM Workshop on RBAC, Fairfax, VA,1999.
  • 6[6]Osborn S, Sandhu R, Munawer Q. Configuring role-based access control to enforce mandatory and discretionary access control policies[J]. ACM Transactions on Information and System Security, 2000,3:85-106.
  • 7[1]Sandhu R S,Coyne E J,Feinstein H L,et al.Role-based Access Control Models. IEEE Computer, 1996,29(2):38-47
  • 8[2]Oh S,Park S.Enterprise Model as a Basis of Administration on Rolebased Access Control.IEEE,Comput. Soc,2000,10:150-158
  • 9[3]Zahir Tari,Chan Shunwu. A Role-based Access Control for Intranet Security. IEEE Intemet Computing, 1997-09/10:24-34
  • 10[4]Sandhu R, Munawer Q.The RRA97 Model for Role-based Administration of Role Hierarchies. IEEE Computer, 1998:39-49

共引文献36

同被引文献24

  • 1章志明,张正球,余敏.一种基于RBAC的多个域之间安全访问控制[J].计算机工程,2005,31(15):135-136. 被引量:9
  • 2谢轶才,殷兆麟.使用LDAP在Web中实现基于角色的访问控制[J].微机发展,2005,15(12):164-166. 被引量:3
  • 3费洪海,陈丽莉,张春晓.基于NC的电子政务系统的设计与实现[J].微计算机信息,2006(04X):211-214. 被引量:2
  • 4杨秋伟,洪帆,杨木祥,朱贤.基于角色访问控制管理模型的安全性分析[J].软件学报,2006,17(8):1804-1810. 被引量:38
  • 5[3]Dr.Demien Watkins Sebastian Lange.An Overview of Security in the.NET Framework[EB/OL][2006-02-15].http://msdn.microsoft.com/library/default.asp? url =/library/en-us/dnnetsec/html/netframesecover.asp,2002.
  • 6[4]Mike Downen Find Out What's New with Code Access Security in the.NET Framework 2.0[EB/OL][2006-02-15].http://msdn.microsoft.com/msdnmag/issues/05/11/CodeAccessSecurity/default.aspx,2005.
  • 7Venkata B,Ravi S.Push architectures for user role assignment[C]//James C,Ravi S.23rd National Information Systems Security Conference,Baltimore,2000.California:National Institute of Standards and Technology,National Computer Security Center,1998:89.
  • 8Sandhu R S,Ccyne E J,Feinstein H L.Role-based access control models[J].IEEE Computer,1996,29(2):38.
  • 9Ravi Sandhu.The RBAC96 Model[EB].INFS 767 Fall 2003.http://www.list.gmu.edu/
  • 10REC-xml-19980210.Extensible markup language (XML)1.0[S/OL].http://www.w3.org.

引证文献6

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部