期刊文献+

一种军用的基于任务-角色的访问控制模型 被引量:3

Task_role_based Access Control Model for Military Use
下载PDF
导出
摘要 传统的强制访问控制策略(MAC)可操作性、灵活性差,日益不适应分工明确、分布性广、实时性要求高的军事领域,基于任务-角色的访问控制策略(T_RBAC)结合了基于角色(RBAC)和基于任务(TBAC)访问控制的优点,应用性很广。在分析了强制访问控制思想后,将其引入基于任务-角色的访问控制模型中,构建了一种军用的基于任务-角色的访问控制模型,并对模型的性能作了简要分析。 The traditional mandatory access control tragedy (MAC), which is weak in maneuverability and flexibility, can not fit well in the military field gradually, which is definitely divided into several posts, geographically widely distributed and high real-timely demanded as well. The task_role_based access control tragedy (T_RBAC) which combines advantages of both RBAC and TBAC has a good practicability. The spirit of MAC is analyzed and then introduced into a task_role_based access control model. At last, a task_role_based access control model for military use is built, and its capability is simply analyzed.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第23期165-167,179,共4页 Computer Engineering
关键词 强制访问控制 基于任务-角色的访问控制 角色层次 角色组 任务模板 MAC Task_role_based access control(T_RBAC) Role hierarchy Role group Task template
  • 相关文献

参考文献4

二级参考文献29

  • 1WfMC. TC00-1019:Workflow Management Coalition Workflow Security Considerations White Paper[S]. http://www. wfmc.org, 1998.
  • 2Miller J A, etal. Security in Web-based Workflow Management Systems[C].ACM Trans. on Information and System Security, 2002.
  • 3Sandhu RS, Coyne E J, Feinstein H L, Youman C E. Role Based Access Control Models[J]. In IEEE Comnputer, 1996,29(2):38-47.
  • 4Kandala S, Sandhu R. Secure Role-based Workflow Models[J]. In Proceedings of the 15th IFIP WG 11.3 Wonking Conference on Database Security,Kluwer 2002: 45 - 58.
  • 5Kumar A, Kamik N, Chafle G. Context Sensitivity in Role-based Access Control[J]. ACM SIGOPS Operating Systems Review, July 2002.
  • 6SANDHU R S. Lattice-Based Access Control Models [ J ]. IEEE Computer, 1993,26 ( 11 ): 9-19.
  • 7BSR INCITS 359-2003. American National Standard for Information Technology-Role-Based Access Control[ S].
  • 8SYLVIA OSBORN, RAVI SANDHU, QAMAR MUNAWER. Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies[J]. ACM Transactions on Information and System Security, 2000, 3 (2) :85-106.
  • 9MUNAWER Q. 2000. Administrative Models for Role-Based Access Control[D]. Fairfax Virginia: George Mason University,2000.
  • 10SANDHU R. Role Hierarchies and Constraints for Lattice-Based Access Controls [A]. In Proceedings of the Conference on Computer Security (ESORICS 96, Rome, Italy) [C]. New York: NY: Springer-Verlag, 1996:65-79.

共引文献35

同被引文献40

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部