期刊文献+

混合RBAC-DTE策略的多角色管理 被引量:13

Administration of Multiple Roles in the Hybrid RBAC-DTE Policy
下载PDF
导出
摘要 混合的基于角色访问控制-域型增强(RBAC-DTE)访问控制模型因其不同层次的保护机制近年来颇受关注,但是尚未见到公开的文献讨论混合RBAC-DTE策略中的多角色管理问题.因此,从特权层面和访问许可权层面上,提出了一种角色划分粒度比域划分粒度粗的角色和域的划分方法,并引入域的静态继承关系.这种混合RBAC-DTE策略的多角色管理方法解决了不同域的进程共享访问许可权集、控制策略代码尺寸的问题,特别是它可以充分支持极小特权原则. The hybrid Role Based Access Control-Domain and Type Enforcement (RBAC-DTE) access control model has recently been given much attention due to its different level of protect mechanisms. But no published literature has discussed administration of multiple roles in the hy- brid RBAC-DTE policy. From the aspect of privilege and access right, this paper proposes an approach to dividing roles and domains that roles are more coarse-grained than domains, and introduces a static-inheritance relationship between domains. This method for multirole administration in the hybrid RBAC-DTE policy solves the problem of sharing access right set among processes in different domains and the problem of controlling policy code size, especially, supports the principle of least privilege sufficiently.
出处 《计算机学报》 EI CSCD 北大核心 2006年第8期1419-1426,共8页 Chinese Journal of Computers
基金 北京市自然科学基金(4052016) 国家自然科学基金(60573042) 国家"九七三"重点基础研究发展规划项目基金(G1999035802)资助.
关键词 安全策略 混合RBAC-DTE访问控制模型 极小特权原则 多角色管理 Capability机制 security policy hybrid RBAC-DTE access control model principle of least privilege administration of multiple roles capability mechanism
  • 相关文献

参考文献12

  • 1Sandhu R. S. , Coyne E. J. , Feinstein H. L. , Youman C. E..Role- based access control models. Computer, 1996, 29 (2) :38-47
  • 2Badger L. , Sterne D. F. , Sherman D. L. , Walker K. M.. A domain and type enforcement UNIX prototype. USENIX Computing Systems, 1996, 9(1): 47-83
  • 3Hallyn Serge E. , Kearns Phil. Domain and type enforcement for Linux. In: Proceedings of the 4th Annual Linux Showcase and Conference, Atlanta, Georgia, USA, 2000, 247-260
  • 4季庆光,卿斯汉,贺也平.基于DTE技术的完整性保护形式模型[J].中国科学(E辑),2005,35(6):570-587. 被引量:4
  • 5Hoffman J.. Implementing RBAC on a type enforced system.In: Proceedings of the 13th Annual Computer Security Applications Conference(ACSAC'97), Washington, DC, USA, 1997,158-163
  • 6Chandramouli R.. A framework for multiple authorization types in a healthcare application system. In: Proceedings of the 17th Annual Computer Security Applications Conference(ACSAC'2001), Washington, DC, USA, 2001, 137-148
  • 7National Security Agency. Security-Enhanced Linux(SELinux).Available at http://www. nsa. gov/selinux
  • 8Smalley S.. Configuring the SELinux policy. NAI Labs, Network Associates, Inc., Glenwood, Maryland, USA.. Technical Report # 02-007, 2002. Available at http://www. nsa. gov/selinux/info/docs. cfm
  • 9季庆光,卿斯汉,贺也平.支持POSIX权能机制的一个新的特权控制的形式模型[J].中国科学(E辑),2004,34(6):683-700. 被引量:5
  • 10Data General. Managing security on DG/UX system. Data General Corporation, Westboro, Massachusetts, USA:Manual 093-701138-09, 2001

二级参考文献50

  • 1[18]Ferraiolo D F, Barkley J F, Kuhn D R. A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Infoemation and System Security, Vol.2, No. 1, February 1999. 34~64
  • 2[19]Clark D D, Wilson D R. A comparison of commercial and military security policies. In: Proceedings of 1987 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, April 1987,184~238
  • 3[20]Ferraiolo D F, Cugini J A, Kuhn D R. Role-based control(RBAC): features and motivations, In: Proceedings. 11th Annual Computer Security Applications Conference, December 1995, 241~248
  • 4[1]Curry, D. A. Improving the security of your UNIX system, Technology report ITSTD-721-FR-90-21, SRI International, April 1990
  • 5[2]IBM server group, Addressing secrity issues in Linux. A Linux White Paper, 2000
  • 6[3]Data General, Managing security on DG/UX system, manual 093-701138-4, Data General Corporation,Westboro, MA01580, Nov. 1996
  • 7[4]Cowan C, Beattie S, Kroach-Hartman G, et al. SubDomain: parsimonious server security, 14th USENIX Systems Administration Conference (LISA 2000), New Orleans, LA, December 2000, 355~367
  • 8[5]Chandramouli R. A framework for multiple authorization types in a healthcare application system. In:Proc. 17th Annual Computer Security Applications Conference, December 2001, 137~148
  • 9[6]Hoffman J. Implementing RBAC on a type enforced system. In: Proc. 13th Annual Computer Security Applications Conference, December 1997, 158~163
  • 10[7]Sandhu R S, Coyne E J, Feinstein H L, et al. Role Based Access Control Models. IEEE Computer, vol 29, Num 2, February 1996, 38~47

共引文献7

同被引文献67

引证文献13

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部