期刊文献+

在RBAC模型中“责权分离约束”的冲突检测与消解

Conflict Checking and Solving of Separation of Duty Constraints in RBAC
下载PDF
导出
摘要 详细论述了责权分离约束在基于角色的访问控制(RBAC)中的冲突检测与解决方案。研究了该约束在“权限-角色授权”(PRA)、“权限-主体授权”(PSA)、“角色-主体授权”(RSA)、“角色-角色授权”(RRA)等各类授权关系中的典型示例,并结合数学中的有向图理论给出冲突检测的算法分析,为实际应用奠定了基础。此外,还对冲突产生后的消解方法进行了深入讨论,总结出多种方案并进行仿真比较,根据实验结果给出一套优化后的解决途径。 The conflict checking and solving of separation of duty constraints were particularly discussed in RBAC we researched these constraints' typical examples in authorization relations of the permission-to-role assignment (PRA), the permission-to subject assignment (PSA), the role-to-subject assignment (RSA), and the definition of a role hierarchy (role-to-role assignment, RRA). The arithmetic analysis of conflict checking which links with the theory of directed acycline graph (DAG) was provided. It will be a basis for practicall application. Furthermore, the conflict solving was further discussed in the paper. Several schemes are summarized and achieved imitating experiment. Subsequently, we provided an optimized solving method for the further work.
出处 《科技导报》 CAS CSCD 2005年第12期40-43,共4页 Science & Technology Review
关键词 责权分离 冲突检测 冲突消解 有向无环图 角色分层 separation of duty, conflict checking, conflict solving, directed acycline graph, role hierarchy
  • 相关文献

参考文献7

  • 1FERRAIOLO D, KUHN R, CHANDRAMOULI R. Role-based access control.[M]. MA USA. 685 Canton St. Norwood: Artech House Inc, 2003.
  • 2SIMON R, ZURKO M. Separation of duty in role-based environments: Proceedings of the 10th Computer Security Foundations Workshop [C]. Washington, D C: IEEE Computer Society Press, 1997.
  • 3LUPU E, SLOMAN M. Conflicts in policy-based distributed systems management [J]. IEEE Transactions on Software Engineering(Special Issue on Inconsistency Management). 1999,25(6): 852~869.
  • 4SANDHU R, FERRAIOLO D, Kuhn R. The NIST model for rolebased access control: towards a unified standard: Proceedings of the Fifth ACM Work-shop on Role-Based Access Control (RBAC'00), Berlin, Germany,July 2000 [C]. Bevlin: ACM Press,2000.
  • 5BUCKLEY F, LEWINTER M. A friendly introduction to graph theory[M]. Prentice Hall, 2003.
  • 6LUPU E, SLOMAN M. Conflict analysis for management policies.Fifth IFIP/IEEE International Symposium on Integrated Network Management. San-Diego,1997[C]. Chapman & Hall, Ltd, 1997.
  • 7STEGMANN C. A framework for authorization policies [D]. 2229Route des Cre^etes, F-06904 Sophia Antipolis, France: Institut Eurécom, 1997.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部