期刊文献+

基于角色的时态对象存取控制模型 被引量:18

Role-Based Access Control Model of Temporal Object
下载PDF
导出
摘要 以基于角色的存取控制模型RBAC3为基础,提出一种新的时态对象存取控制模型TRBAC,讨论了模型的构成要素,体系结构,时态多重继承机制和存取控制方法.它支持时态用户、时态角色和时态客体及其层次结构,具有动态存取控制功能,在时态数据库和工作流系统等领域会得到广泛应用. A novel temporal object access control model (TRBAC) is proposed based on the role-based access control model (RBAC3). The elements, architecture, temporal inherent mechanism and access control method of TRBAC are discussed respectively. It supports temporal user, temporal role and temporal object and their hierarchy structures, and has the dynamic access control power. It may have applications in such as temporal database and workflow management system.
出处 《电子学报》 EI CAS CSCD 北大核心 2005年第9期1634-1638,共5页 Acta Electronica Sinica
关键词 时态对象 存取控制 角色 时间约束 时态继承机制 temporal object access control role time constraint temporal inherence mechanism
  • 相关文献

参考文献8

  • 1F Ferraiolo,R Sandhu,R Kuhn.Proposed NIST standard for role-based access control[J].ACM Transaction on Information and System Security,2001,4(3):224-274.
  • 2E Bertino,C Bettini.An access control model supporting periodicity constraints and temporal reasoning[J].ACM Transactions on Database Systems,1998,23(3):231-285.
  • 3L GiuRi,P IgLio.A formal model for role-based access control with constrains[A].In the Proceedings of the 9th IEEE Workshop on Computer Security Foundations[C].USA:IEEE Press,1996.136-145.
  • 4Trent Jaeger.On the increasing importance of constraints[A].In the Proceedings of the 4th ACM Workshop on Role-Based Access Control[C].USA:ACM Press,1999.33-42.
  • 5E Bertino,P A Bonatti,E Ferrari.TRBAC:A temporal role-based access control model[J].ACM Transactions on Information and System Security,2001,4(3):58-90.
  • 6S Barker.TRBACN:A Temporal Authorization Model[M].Lecture Notes in Computer Science,Berlin:Springer-verlag Press,2001.
  • 7王小明,赵宗涛,马建峰.一种新的RBAC角色协同关系及其Petri网模型[J].电子学报,2003,31(2):225-227. 被引量:4
  • 8赵庆松,孙玉芳,张晓平.基于角色的域-类型增强访问控制模型研究及其实现[J].电子学报,2003,31(6):842-846. 被引量:3

二级参考文献21

  • 1Sandhu D Ferraiolo, R Kuhn. The NIST model for role-based access control:towards a unified standdard . In the Proceedings of 5^th ACM Workshop on Role-based Access Control. USA: ACM, 2000.60- 110.
  • 2D Richard kuhn. Mutual exclusion of roles as a means of implementing separation of duty in role-based access controlsystems [A] .In the Proceedings of the Second ACM Workshop on Role-based Access Control[ C]. USA : ACM, 1997. 240 - 252.
  • 3R Sandhu, P Samarafi. Access control principles and practice[J]. IEEE Comm, 1999:40- 48.
  • 4D S Wallach, D Balfanz, D Dean,E W Felten. Extensible Security Architectures for Java [ R ]. Technical Report 546 - 97, Department pf Computer Science, Princeton University, Apr. 1997.
  • 5Sandhu, R. Separation of duties in computerized informatioo systems[A] .Proc of IFIP WG11.3 Workshop on Database Security [C].North Holland, 1990.179 - 189.
  • 6Kenneth M Walker, Daniel F Sterne. Confining root programs with domain and type enforcement [A] .Proc of the Sixth USENIX UNIX Security Symposium [ C ]. San Jose, California,1996.21 - 36.
  • 7W E Boebert, R Y Kain. A practical alternative to hierarchical integrity policies [A]. Proc 8th DoD/NBS Computer Security Initiative Conference [ C ]. Gaithersburg, MD, September, 1985.18 - 27.
  • 8R O'Brien,C Rogers. Developing applications on LOCK [A]. Proc of 14th National Computer Security Conference [ C ]. Washington, DC,Oct, 1991.147 - 156.
  • 9Butler W Lampson. Requirements and Technology for Computer Securi-ty[R]. Computers at Risk. Washington: Natiunal Academy Press,1991.74- 101.
  • 10C Bidan, V Issarny. Dealing with multi-policy security in large open distributed systems [A] .Proc of 5th European Symposium m Research in Computer Security [ C]. Louvain-la-Neuve, Belgium, Sep. 1998.51-66.

共引文献5

同被引文献165

引证文献18

二级引证文献388

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部