期刊文献+

强制访问控制在基于角色的保护系统中的实现 被引量:5

Realization of Mandatory Access Control in Role-based Protection Systems
下载PDF
导出
摘要 研究了通过对基于角色的访问控制(RBAC)进行定制实现强制访问控制(MAC)机制的方法。介绍了RBAC模型和MAC模型的基本概念,讨论了它们之间的相似性,给出了在不考虑角色上下文和考虑角色上下文两种情形下满足强制访问控制要求的RBAC系统的构造方法。从这两个构造中可以看出,强制访问控制只是基于角色的访问控制的一种特例,用户可以通过对RBAC系统进行定制实现一个多级安全系统。 The realization of mandatory access control (MAC) by configuring role-based access control (RBAC) is investigated. First, the basic definitions of RABC model and MAC model are introduced. Second, the similarities between them are discussed. Third, two constructions are given which simulate MAC in RBAC systems. Among the constructions one considered the role context and the other not. It is obvious from the two constructions that MAC is just one instance of RBAC, so users can implement a multilevel secure system by configuring a RBAC system whenever necessary.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第6期167-169,共3页 Computer Engineering
关键词 基于角色的访问控制 强制访问控制 基于格的访问控制 Role-based access control Mandatory access control Lattice-based access control
  • 相关文献

参考文献5

  • 1Nyanchama M,Osborn S.Modeling Mandatory Access Control in Role-based Security Systems[C].Database Security III:Status and Prospects,Chapman and Hall,London,UK,1997.
  • 2Osborn S.Information Flow Analysis of an RBAC System[C].Proceedings of the ACM SACMAT.Monterey,California,2002:163-168.
  • 3李立新,陈伟民,黄尚廉.强制访问控制在基于角色的安全系统中的实现[J].软件学报,2000,11(10):1320-1325. 被引量:48
  • 4Osborn S,Sandhu R,Munawer Q.Configuring Role-based Access Control to Enforce Mandatory and Discretionary Access Control Policies[J].ACM Transactions on Information and System Security,2000,3 (2):85-106.
  • 5Sandhu R,Coyne E,Feinstein H,et al.Role-based Access Control Models[J].IEEE Computer,1996,29 (2):38-47.

二级参考文献2

  • 1Sanhu R S,IEEE Computer,1996年,29卷,2期,38页
  • 2Lunt T F,Research Directions in Database Security,1992年,98页

共引文献47

同被引文献28

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部