期刊文献+

一种基于任务和角色的访问控制模型及其应用 被引量:16

A Model of Task-Role Based Access Control and Its Application
下载PDF
导出
摘要 近年来RBAC(Role-Based Access Control)及TBAC(Task-Based Access Control)模型得到广泛的研究。文中比较了一些现有访问控制模型的各自特点和适用范围,针对现有模型的不足,为了提高系统的安全性、通用型和实用性,通过结合RBAC及TBAC模型各自的优点,提出了一个新型的访问控制模型T-RBAC(Task-Role Based Access Control)。描述了T-RBAC模型结构和特点,阐述了模型对最小权限原则、职权分离原则、数据抽象原则及角色层次关系的支持,给出了模型在协同编著系统中的一个应用和将来工作的主要目标。 The research work of RBAC (role- based access control) and TBAC (task - based access control) is greatly emphasized in recent years. This paper compares the characteristics and applicability spectrum of some recent models. To the deficiency of the existing model, in order to improve the security, compatibility and practicability of application systems, through combining the advantages of RBAC and TBAC model, a new - type model, T- RBAC(task- role based access control), is discussed. The configuration and characteristics of the model is described. The support of least privilege, separation of duties, data abstraction and roles hierarchies in the model is explained. An application of the model in computer supported cooperative system and the main goal of future research is presented.
出处 《计算机技术与发展》 2006年第2期212-214,共3页 Computer Technology and Development
基金 江苏省高校指导性项目(Q2118042)
  • 相关文献

参考文献10

二级参考文献28

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2[1]Sandhu, R. Issues in RBAC . In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 21~24.
  • 3[2]Jaeger, T. On the increasing importance of constraints. In: Proceedings of 4th ACM Workshop on Role-Based Access Control. Fairefax, VA: ACM Press, 1999. 33~42.
  • 4[3]Ahn, G.-J. The RCL2000 language for specifying role-based authorization constraints [Ph.D. Thesis]. Fairfax, VA: George Mason University, 1999.
  • 5[4]Sandhu, R., Coyne, E.J., Feinstein, H.L., et al. Role-Based access control models. IEEE Computer, 1995,29(2):38~47.
  • 6[5]Chen, Fang, Sandhu, R. Constraints for role-based access control. In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 39~46.
  • 71,Ferraiolo D F, Kuhn R. Role-Based access control. In: Proceedings of the 15th National Computer Security Conference. Baltimore, MD, 1992. 554~563, http://hissa.ncsl.nist.gov/kuhn/
  • 82,Sandhu R, Samarati P. Access control: principles and practice. IEEE Communications, 1994,32(9):40~48
  • 93,Ramaswamy C, Sandhu R. Role-Based access control features in commercial database management systems. In: Proceedings of the 21st National Information Systems Security Conference. Virginia: U.S. Government Printing Office, 1998, http://www.list.gmu.edu/conferen.htm
  • 104,Sandhu R, Coyne E J, Feinstein H L et al. Role-Based access control models. IEEE Computers, 1996,29(2):38~47

共引文献443

同被引文献93

引证文献16

二级引证文献57

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部