期刊文献+

校园网角色访问控制应用研究 被引量:1

Study on RBAC's application in campus network
下载PDF
导出
摘要 校园网账号管理系统缺乏时间约束,造成用户账号在某些时间段上易被攻击和盗用。提出了一个基于TRBAC模型的校园网账号管理系统的设计方案:构建一个访问控制系统的总体结构,结合DBMS系统设计了系统表。该方案通过时间约束可以避免用户账号易被攻击和盗用,可以有效地解决校园网安全访问控制问题。 The account management system of campus network has not temporal constraints, its account numbers are easily attacked and embezzled during some periods. A project on the account management system of campus network based on TRBAC is developed: Firstly a frame of access control is constructed to describe the TRBAC system operated in DBMS; secondly the system role table is designed by combining with DBMS system. The network attacks and embezzlements are avoided and the problems of campus network security is solved by temporal constraints.
出处 《计算机工程与设计》 CSCD 北大核心 2006年第20期3817-3820,共4页 Computer Engineering and Design
基金 河海大学2003年科技创新基金项目(2003409443)
关键词 校园网 访问控制 RBAC模型 TRBAC模型 时间约束 campus network access control role-based access control TRBAC temporal constraints
  • 相关文献

参考文献9

  • 1蒋东兴,刘启新,白冰,戚丽.校园网络计费系统研究与实现[J].计算机工程,2000,26(S1):319-324. 被引量:4
  • 2David Ferraiolo,Rick Kuhn.Role-based access control[C].Proceedings of 15th National Computer Security Conference,1992.
  • 3Ravi Sandhu,Edward Coyne,Hal Feinstein,et al.Role-based access control models[J].IEEE Computer,1996,29(2):38-47.
  • 4Ferraiolo D,Sandhu R,Gavrila S,et al.A proposed standard for role-based access control[J].ACM Transactions on Information and System Security,2001,4(3):224-274.
  • 5http://csrc.nist.gov/rbac/[EB/OL].
  • 6Park J,Sandhu R,Ahn G.Role-based access control on the web[J].ACM Transactions on Information and System Security,2001,4(1):37-71.
  • 7Bertino E,Bonatti P,Ferrar E.TRBAC:A temporal role-based access control model[J].ACM Transactions on Information and Systems Security,2001,4(3):191-223.
  • 8杨亚平,李伟琴,刘怀宇.基于角色的细粒度访问控制系统的研究与实现[J].北京航空航天大学学报,2001,27(2):178-181. 被引量:27
  • 9Chandramouli R,Sandhu R.Role-based access control features in commercial database management systems[C].Proceedings of the NIST-NSA National (USA) Computer Security Conference,1998.503-511.

二级参考文献7

共引文献29

同被引文献8

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部