期刊文献+

实现基于角色访问控制的PMI角色模型 被引量:3

A PMI role model for implementation of role-based access control
下载PDF
导出
摘要 研究了用权限管理基础设施(PMI)的角色模型实现基于角色的访问控制的相关问题,提出了一种改进PMI角色模型.改进模型增加了用户组规范属性证书和用户组分配属性证书,并为SOA(或AA)增加授权策略库,为权限验证者增加本地角色规范属性证书库和访问控制策略库,给出了授权和访问控制过程.改进模型便于管理具有相同角色的用户的属性证书,能够表达基于角色访问控制中的约束问题,提高了证书查询效率,增强了系统的实用性. The study was carried out of how to implement role based access control by using role model in privilege management infrastructure (PMI). Then, an improved model was introduced. User-group Specification attribute certificate and user-group assignment attribute certificate are introduced into the improved model. Authorization policy depository is deployed at SOA or AA, while local role specifica- tion attribute certificate depository and access control policy depository are deployed at privilege verifi- er. Authorization process and access control process were proposed. The improved model has several advantages, easing management of users' attribute certificates who have the same roles, ability to express constraints in RBAC, enhancing the certificate query efficiency and practicability.
作者 徐兰芳 王飞
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2006年第7期24-26,共3页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(60203017).
关键词 基于角色的访问控制 权限管理基础设施 公钥证书 属性证书 role based access control privilege management infrastructure publie-key certificate attribute certificate
  • 相关文献

参考文献4

  • 1冯瑜瑾 丁志强 罗永红.属性证书:将PKI扩展到授权领域的数字证书[J].云南大学学报:自然科学版,2003,25(6):111-115.
  • 2洪帆,何绪斌,徐智勇.基于角色的访问控制[J].小型微型计算机系统,2000,21(2):198-200. 被引量:43
  • 3Chadwick D W, Otenko A. The PERMIS X. 509 role based privilege management infrastructure[J]. Future Generation Computer Systems, 2003, 19(2): 277-289.
  • 4Chadwick D W, Otenko A. RBAC Ppolicies in XML for X. 509 based privilege management[C]//Ghonaimy M A, El-Hadidi M T, et al. SEC2002. Cairo Egypt: Kluwer Academic Publishers, 2002: 39-53.

二级参考文献3

  • 1.
  • 2D. D Clark,and D. R Wilson.A Comparison of commercial and military computer security policies[].IEEE Symposium on Computer Security and Privacy.1987
  • 3.Integrity in Automated Information Systems[]..1991

共引文献45

同被引文献9

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部