期刊文献+

RBAC模型中对超级用户的权限约束 被引量:4

The authority control to administrator based on RBAC
下载PDF
导出
摘要 分析了目前几种主要RBAC模型中系统管理员权限缺乏约束的问题.提出了一种对超级用户权限的控制方法,通过引入安全员与审计员两个角色,使超级用户之间的权限相互制约,改善了在创建角色及用户授权方面的安全性,从而进一步增强信息系统的安全性. Currently, there are some models that extend RBAC model. However, their supports for constraints on the permission of super users are very limited. This paper proposes a new idea for control permission of administrator. By introducing comptroller role and security role, the permission between super users is mutually checked and supervised. This technique can increase the safeness of creating role and user's authorization, then strengthen the safeness of the information system.
作者 陈迪 王凤英
出处 《山东理工大学学报(自然科学版)》 CAS 2007年第1期77-80,共4页 Journal of Shandong University of Technology:Natural Science Edition
关键词 RBAC 访问控制 权限约束 审计员 RBAC access control authority control comptroller
  • 相关文献

参考文献6

二级参考文献52

  • 1D Ferraio, J Cugini, R Kuhn. Role-Based Access Control ( RBAC ) :Features and Motivations [ C ]. New Orleans, LA : Proceedings of the 1 1 th Annum Computer Security Application Conference, 1995.12-14.
  • 2David F Ferraiolo, John F Barkley, D Richard Kuhn. A Role-Based Access Control Model and Reference Implementation Within a Corporate Intranet [ J ]. ACM Transactions on Information and System Security, 1999,2( 1 ) :34-43.
  • 3Sejong Oh, Seog Park. Task-Role-Based Access Control Model [ J].Information Systems, 2003,28 ( 6 ) :533 - 536.
  • 4Xu Z, Feng DG, Li L, Chen H. UC-RBAC: A usage constrained role-base access control model. In: Qing SH, Gollmann D, Zhou JY, eds. Proc. of the 5th Int'l Conf. on Information and Communications Security. LNCS 2836, Heidelberg: Springer-Verlag, 2003.337-347.
  • 5Gasser M, McDermott E. An architecture for practical delegation in a distributed system. In: Cooper D, Lunt T, eds. Proc. of the1990 IEEE Computer Society Symp. on Research in Security and Privacy. Oakland: IEEE Computer Society Press, 1990. 20-30.
  • 6Gladny HM. Access control for large collections. ACM Trans. on Information Systems, 1997,15(2):154-194.
  • 7Moffett JD, Sloman MS. The source ofauthority for commercial access control. IEEE Computer, 1988,21(2):59-69.
  • 8Nagaratnam N, Lea D. Practical delegation for secure distributed object environments. Distributed Systems Engineering, 1998,5(4):168-178.
  • 9Bandmann O, Dam M, Firozabadi BS. Constrained delegation. In: Proc. of thc 23rd Annual IEEE Symp. on Security and Privacy.Oakland: IEEE Computer Society Press, 2002. 131-143. http://csdl.computer.org/comp/proceedings/sp/2002/1543/00/15430131abs.htm
  • 10Niezette M, Stevenne J. An efficient symbolic representation of periodic time. In: Finin TW, Nicholas CK, Yesha Y, eds. Proc. of the 1st Int'l Conf. on Information and Knowledge Management. LNCS 752, Springer-Verlag, 1992.

共引文献95

同被引文献32

引证文献4

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部