期刊文献+

一种具有时间约束的基于角色的授权管理模型 被引量:12

A Temporal Role-Based Administration of Authorization Model
下载PDF
导出
摘要 针对大型系统中角色权限管理的复杂性,提出了一种具有时间约束的基于角色的授权管理模型.考虑到用户权限通常包括私有权限、部门权限及公有权限,并存在权限频繁变动等问题,该模型扩展了权限定义,在权限定义中增加了权限的传播深度参数,即增加了可被继承的次数,使该参数与现实世界中的各级岗位数及权限类型相对应.另外,该模型在权限的继承中也加入了时间约束,使得只有满足时间条件要求的角色的权限才可以被继承.结果表明,该模型不仅有利于权限的频繁更新,也对应了现实世界中的岗位数,易于理解与操作. As the role administration of authorization in large system is complex, a temporal role-based administration of authorization model is proposed in this paper. Consider that the user permission usually includes private permission, department permission and public permission, and the permission need update frequently, so the model expands the definition of permissions by adding a parameter of permission transmitting depth, i.e. the number that the permission can be inherited, which corresponds to the number of posts and the kind of permission in reality. And further, the model adds temporal constraint in permissions inheritance, i.e. only the permissions owned by the role that meets time requirement can be inherited. The model not only benefits from permissions update frequently, but also corresponding to the number of posts in reality, and it is easy to understand and operate.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2006年第5期578-581,共4页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金(50477038) "十五"国家部委科技(电子)预研基金(413160501)资助项目
关键词 授权管理 基于角色的访问控制 时间约束 权限指派 administration of authority RBAC (role-based access control) time constraint permission assignment
  • 相关文献

参考文献10

  • 1Wang Baoyi, Zhang Shaomin, Xia Xiaodong. The Application Research of Role-Based Access Control Model in Workflow Management System[J]. Springer-Verlag Berlin, Lecture Notes in Computer Science, 2004,3033:1034-1037.
  • 2Wang Baoyi, Zhang Shaomin. The Research on RoleBased Access Control Mechanism for Workflow Management System [J]. Springer-Verlag Berlin, Lecture Notes in Computer Science ,2004,3251:729-736.
  • 3Sandhu R,Coyne E, Feinstein H,et al. Role-Based Access Control Model [J]. IEEE Computer, 1996,29(2) :8-47.
  • 4余文森,张正球,章志明,余敏.基于角色的访问控制模型中私有权限问题的研究[J].计算机应用研究,2004,21(4):50-51. 被引量:18
  • 5吕宜洪,宋瀚涛,龚圆明.政府机关公文流转系统访问控制基本框架及改进的RBAC模型研究[J].计算机应用研究,2003,20(1):31-34. 被引量:4
  • 6Zhang Shaomin, Wang Baoyi. Research on a FinedGrained Access Control Model in Cross-Domain grid[C]//Proc of SKG 2005. New York: IEEE Press,2005, 843-849.
  • 7Xu Zhen, Feng Dengguo, Li Lan,et al. UC-RBAC: A Usage Constrained Role-Based Access Control Model[J]. ICICS 2003, LNCS. Berlin: Springer-Verlag,2003,2836(C):337-347.
  • 8Bertino E,Bonatti P A,Ferrari E. TRBAC: A Temporal Role-based Access Control Model [J]. ACM Transactions on Information and System Security,2001,4(3):191-223.
  • 9Joshi J B D. A Generalized Temporal Role Based Access Control Model for Developing Secure system[D].West Lafayette: Purdue University, 2003.
  • 10Zhang Shaomin, Wang Baoyi. Research on Improved Role Hierarchy Model in Extended Organization PKI Networks[C]//Proc of PDCAT 2005. New York:IEEE Press,2005,339-342.

二级参考文献11

  • 1[1]Sandhu R,Coyne E,Feinstein. Role-based Access Control Model[J].IEEE Computer,1996,29(2):38-47.
  • 2[2]Sandhu R,Munawer Q. The ARBAC99 Model for Administration of Roles[EB/OL]. http://www.list.gmu.edu/conferencepapers.htm,2001-03-08.
  • 3[3]Sandhu R,Ferraiolo D,Kuhn R. The NIST Model for Role-based Access Control: Towards A Unified Standard[C].Berlin Germany:Proceedings of the fifth ACM Workshop on Role-based Access Control,July 2000.47-63.
  • 4[4]Glenn Faden. RBAC in UNIX Administration[C].Fairfax,VA USA:Proceedings of the Fourth ACM Workshop on Role-based Access Control,October 1999.95-101.
  • 5[5]Schaad A,et al.The Role-based Access Control System of a European Bank[C].Chantilly,VA USA:Sixth ACM Symposium on Access Control Models and technologies,May 2001.3-9.
  • 6[6]Swift M. Improving the Granularity of Access Control in Win-dows NT[C]. Chantilly,VA USA:Sixth ACM Symposium on Access Control Models and Technologies,May 2001.87-96.
  • 7[7]Sandhu R,Bhamidipati V. An Oracle Implementation of the PRA97 Model for Permission-role Assignment[C]. Fairfax,VA USA: third ACM Workshop on RBAC,October,1998,13-21.
  • 8刘琼波.[D].上海:上海交通大学计算机科学与工程系,.
  • 9Ravi S Sandhu, et al. Role-based Access Control Models [ J ]. IEEE Computer, 1996,29(2 ) :8-47.
  • 10Matunda Nyanchama,Sylvia Osbom. Access Rights Administration in Role- based Security System [ A ] IN: J Biskup, M Morgenstem C E Landwehr. Database Security Ⅷ : Status & Prospects [ C ]. North- Holland : Elsevier, 1994.37- 56.

共引文献20

同被引文献65

引证文献12

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部