期刊文献+

一种基于树型结构的B/S系统权限控制方法 被引量:17

An Authority Access Control Method in B/S System Based on the Tree-structure
下载PDF
导出
摘要 在应用RBAC技术的基础上研究了基于树型结构下的B/S系统中权限控制方法,通过系统资源树的生成,提出了用户权限数据报的概念及其设计思想,并在实践中加以应用。实现了系统全局资源的安全访问控制,增加了系统的灵活性。 Based on the RBAC technology, this paper studies the method of user access control authority which adopted the tree-structure in B/S system. Through generating the system resource tree and then putting it in use, the conception of user authority data package and its design idea is proposed. And the experiments validated that our approach is more effective and flexible.
出处 《计算机应用研究》 CSCD 北大核心 2005年第10期128-130,共3页 Application Research of Computers
基金 国家"863"计划资助项目(2002AA414060)
关键词 基于角色的访问控制 B/S 系统资源树 用户权限 Tree RBAC B/S System Resource Tree User Authority
  • 相关文献

参考文献6

二级参考文献13

  • 1Ferrraiolo D F,Barkley J F,Kuhn D R.A Role Based Access Control Model and Refernence Implementation Within a Corporate Intranet [J].ACM Transactions on Information Systems Security, 1999-02.
  • 2http ://www-9OO.ibm.com/developerWorks/cn/security/syscontrol/index.shtml.
  • 3Ferraiolo D F,Barkley J F,Kuhn D R.A Role Based Access Control Model and Reference Implementation Within a Corporate Intranet ACM Transactions on Information Systems Security, 1999-02
  • 4Gavrila S I, Barkley J F. Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management. Third ACM Workshop on Role-based Access Control, 1998
  • 5Sandhu R, Coyne E J,Feinstein H L,et al. Role-based Access Control Models. IEEE Computer, 1996,29(2)
  • 6RaviSandhu,EdwardCoyne,HalFeinsteinetal.Role-BasedAccessControlModels犤J犦[].IEEE Computer.1996
  • 7avidFFerraiolo,DennisMGilbert,NickilynLynch.Anexaminationoffederalandcommercialaccesscontrolpolicyneeds[].Proceed-ingsofNIST-NCSCNationalComputerSecurityConference.1993
  • 8DanThomsen,DickO’’Brien,JessicaBogle.RoleBasedAccessControlFrameworkforNetworkEnterprises[].ProceedingsofthAnnualCom-puterSecurityApplicationConference.
  • 9JohnBarkley.ImplementingRole-BasedAccessControlUsingObjectTechnology[].ProceedingsofFirstACMWorkshoponRole-BasedAccessControl.1995
  • 10董浩.MIS 的安全性研究[J].烟台大学学报(自然科学与工程版),1997,10(4):287-290. 被引量:5

共引文献93

同被引文献85

引证文献17

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部