期刊文献+

一种RBAC组图模型研究 被引量:2

Research of groupgraph model for RBAC
下载PDF
导出
摘要 简要介绍了RBAC模型和角色图模型。提出了一种组图模型,重点分析了组图模型和角色图模型之间的关系。在两者关系的基础上,提出了组-角色分配的平行四边形法则。利用该法则,用户组-角色授权将变得规范化、正规化,且更加易于实施。 Model of RBAC and RoleGraph were introduced briefly. A GroupGraph model was proposed, and the relationship between GroupGraph and RoleGraph model was specially analysed. Then based on this relationship, a parallelogram principle for Group-Role Assignment was proposed. With this principle, user/group-role authorization could be easily tracked, validated and implemented.
出处 《计算机工程与设计》 CSCD 北大核心 2005年第11期2972-2974,共3页 Computer Engineering and Design
关键词 基于角色的访问控制 角色图 组图 子组 超组 基组 RBAC rolegraph groupgraph subgroup supergroup basegroup
  • 相关文献

参考文献7

  • 1Mattmda Nyanchama,Osbom Sylvia.The role graph model and contact of interest [J]. ACM Transactions on Information and Systems Security, 1999,2(1): 10-33.
  • 2Lawrence L G, The role of roles [J]. Computers and Security,1993, 12(12):15-21.
  • 3David F Feraiolo, Ravi Sandhu, Serban Gavrila. Proposed NIST standard for role-based access control[J].ACM Transactions on Information and System Security, 2001,(3):224-274.
  • 4Ravi Sandhu, Venkata Bhamidipati, Qamar Munawer, The ARBAC97 model for role-based administration of roles [J]. ACM Transactions on Information and System Security, 1999,2 (1):105-135.
  • 5Sandhu R S, Coyne E J,Feinstein H L, et al.Role-based access control models[J].IEEE Computer, 1996,29(2):38-47.
  • 6Ahn G J,Arvisandhu.Role-based authorization constrains specification[J]. ACM Transcations on Information and System Security, 2002,(3):207-226.
  • 7施景超,孙维祥,许满武.基于角色的存取控制及其实现[J].计算机应用研究,2000,17(6):13-15. 被引量:48

二级参考文献5

  • 11,D. Ferraiolo, J. Cugini, and D.R.Kuhn. Role Based Access Control: Features and Motivations. In Annual Computer Security Applications Conference. IEEE Computer Society Press, 1995
  • 22,D. Richard Kuhn. Mutual Exclusion of Roles As a Means of Implementing Separation of Duty in Role-Based Access Control Systems National Institute of Standards and Technology. Gaithersburg, Maryland 20899
  • 33,E. B. Fernandez and J. C. Hawkins. Determing Role Rights from Use Cases. ACM97
  • 44,J. F. Berkley. Comparing Simple Role Based Access Control Models and Access Control Lists. NIST. Gaithersburg, MD 1997
  • 55,Observations on the Real-World Implementation of Role-Based Access Control. http://www.schumannsoftware.com/.

共引文献47

同被引文献12

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部