期刊文献+

一种改进的基于角色的访问控制模型 被引量:4

Improved Role Based on Access Control Model
下载PDF
导出
摘要 近几年来,基于角色的访问控制因其具有简单灵活、细粒度控制、可用性强等特点,在协同系统中受到广泛的研究与应用。针对规模较大的协同系统的特点,提出一种改进的访问控制模型,强调主客体的位置关系,区别角色授予给与客体属于相同组织的主体和授予给与客体属于不同组织的主体以更多的角色选择。这样使本模型更加适合大规模协同系统访问控制的需要。 Role based on access control is emphasized recently because of its simpleness,finegrained control ability and strong usability have been proved to be efficient to improve security administration with flexible authorization management system.During the past few years,role based on access control has been studied by many researchers and improvements have been proposed to perfect it.This paper proposed an new improved model to fit for the cooperative system,which emphasizes the position relationship which is called domain between users and objects.This rights in the same domain are quite different from them not in the same.
作者 杜萍 刘弘
出处 《计算机工程与应用》 CSCD 北大核心 2006年第34期154-156,198,共4页 Computer Engineering and Applications
基金 国家自然科学基金资助项目(69975010 60374054) 山东省自然科学基金资助项目(Y2003G01 Z2004G02)。
关键词 基于角色的访问控制 角色 协同设计 role based on access control role domain cooperative design
  • 相关文献

参考文献2

二级参考文献19

  • 1R.S. Sandhu, E. J. Coyne, H. L. Feinstein, et al. Role-based access control models. IEEE Computer, 1996, 29(2): 38~47.
  • 2R.S. Sandhu, D. F. Ferraiolo, D. R. Kuhn. The NIST model for role-based access control: Towards a unified standard. In:Proc. the 5th ACM Workshop on Role-Based Access Control.Berlin: ACM Press, 2000. 47~63.
  • 3D.F. Ferraiolo, R. S. Sandhu, S. Gavrila, et al. Proposed NIST standard for role-based access control. ACM Trans.Information and System Security, 2001, 4(3): 224~274.
  • 4M. J. Moyer, M. Ahamad. Generalized role-based access control. In: Proc. the 21st Int'l Conf. Distributed Computing Systems. Phoenix: IEEE Press, 2001. 391~398.
  • 5M.J. Covington, M. J. Moyer, M. Ahamad. Generalized rolebased access control for securing future applications. The 23rd National Information Systems Security Conf., Baltimore, 2000.http://csrc. nist. gov/nissc/2000/proceedings/.
  • 6Department of Defense (DoD) . Trusted Computer System Evaluation Criteria (TCSEC) (DoD 5200.28-STD 1985 ) . Fort Meade, MD: Department of Defense, 1985.
  • 7R.S. Sandhu, Q. Munawer. How to do discretionary access using roles. In: Proc. the Third ACM Workshop on Role Based Access Control. Barkley: ACM Press, 1998. 47~54.
  • 8S Osborn. Mandatory access control and role-based access control revisited. In: Proc. the Second ACM Workshop on Role Based Access Control. Virginia: ACM Press, 1997. 31~40.
  • 9R. S. Sandhu. Role-based access control. Advances in Computers, 1998, 46:237~286.
  • 10R.S. Sandhu, V. Bhamidipati, Q. Munawer. The ARBAC97 model for role-based administration of roles. ACM Trans.Information and System Security, 1999, 2(1): 105~135.

共引文献27

同被引文献25

引证文献4

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部