期刊文献+

在企业基础信息平台中实现基于角色的访问控制 被引量:4

Implementation of role-based access control mechanism based on enterprise fundamental information platform
下载PDF
导出
摘要 介绍了个人权限、角色权限和临时权限的构成特点,提出了三种不同权限的访问控制方法,并采用server-pull系统架构,针对角色权限对LDAP模式进行扩展,实现了基于RBAC模型在企业基础信息平台中的访问控制应用.系统以LDAP目录服务器当作角色服务器,使用户在某种安全模式下(如在SSL上)得到需要的角色信息,从而实施相关的RBAC策略以达到访问控制目的,具有简单灵活的特点. The network security polices in terms of users personal, role and temporary attributes are introduced; and then the access and control mechanism for the three security polices are put forward. An adoption of server-pull and LDAP structure is discussed to perform access and control for the enterprise fundamental information platform based on RBAC. The system employs LDAP directory server as the role server and users can obtain required information in certain secure mode (e. g. SSL), so as to imple- ment the relevant RBAC strategy to achieve the access control purpose. The structure's feature is simple and flexible.
出处 《武汉大学学报(工学版)》 CAS CSCD 北大核心 2006年第4期102-106,共5页 Engineering Journal of Wuhan University
关键词 访问控制 RBAC LDAP access control role-based access control (RBAC) lightweight directory access protocal(LDAP)
  • 相关文献

参考文献6

二级参考文献37

  • 1陈伟鹤,殷新春,茅兵,谢立.基于任务和角色的双重Web访问控制模型[J].计算机研究与发展,2004,41(9):1466-1473. 被引量:18
  • 2金琼琤,杨树堂,蒋兴浩,李建华.基于T-RBAC的企业权限管理方法[J].计算机工程,2004,30(19):93-95. 被引量:8
  • 3Ravi S Sandhu, David Ferraiolo,Richard Kuhn. The NIST Model for Role-based Access Control: Towards an Unified Standard [ J/OL ].ACM. 2000.47-63.
  • 4David F Feraiolo, Ravi Sandhu,Serban Gavrila, et al. Proposed NIST Standard for Role-based Access Control[ J]. ACM Transactions on Information and System Security, 2001, (3) :224-274.
  • 5Ravi Sandhu, Edward J Coyne. Roie-based Access Control Models[ J]. Computer,1996, (2) :38-47.
  • 6Sandhu R, Bhamidipati V, Munawer Q. The ARBAC97 Model for Role-based Administration of Roles[ J]. ACM Trans. on Information and Systems Security, 1999, ( 1 ) : 105-135.
  • 7Sylvia Osbom, Yuxia Guo. Modeling Users in Role-based Access Control[ C]. Berlin:Proceedings of the 5th ACM Workshop on Rolebased Access Control( RBAC-00), 2000.26-27.
  • 8Ahn GJ, Arvisandhu. Role-based Authorization Constrains Specification [ J]. ACM Transcations on Information and System Security,2002, ( 3 ) :207-226.
  • 9Sandhu R. Role-based Access Control. IEEE Computer, 1996, 29(2):34-47
  • 10Thomas R K, Sandhu R S. Task-based Authorization Controls(TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management. In Proceedings of the 11^th IFIP WG11.3 Conference on Database Security, Lake Tahoe, California, 1997-08

共引文献115

同被引文献26

引证文献4

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部