期刊文献+

基于任务和角色的访问控制(T-RBAC)模型及其实现技术 被引量:1

Task-Role Based Access Control Model and its realization techonology
下载PDF
导出
摘要 RBAC和TBAC是当前比较先进的访问控制技术,但仍有着各自的局限性。基于任务和角色的访问控制(T-RBAC)模型集中RBAC和TBAC两类访问控制的优势,选取任务和角色作为两个基本特征,建立在对任务分类的基础上,既适用于工作流任务,又适用于非工作流任务。依据T-RBAC模型定义,设计了企业环境下基于任务和角色的访问控制模型的总体框架,概述了主要功能模块和系统应用的主要工作流程。 Though RBAC and TBAC are the more advanced access control techonology at present, they have their own limitations. Task -role based access control model has the advantages of both RBAC and TBAC. It selects task and role as its two basic charateristics. Built on the basis of task classification, it qs applicable for both workflow and non - workflow task. Based on the defifition of T - RBAC model, this article designs the general framwork of task and role based access control model on enterprise environment. It gives a brief account of the main workflow of the central function module and system application.
作者 黄福军
出处 《济宁师范专科学校学报》 2006年第6期26-28,共3页 Journal of Jining Teachers College
关键词 访问控制 工作流 RBAC TBAC T—RBAC access control workflow RBAC TBAC T - RBAC
  • 相关文献

参考文献6

二级参考文献13

  • 1L Snyder. Formal Models of Capability-based Protection Systems[ J].IEEE Transactions on Computers, 1981,30(3 ) :172-181.
  • 2R Sandhu, E Coyne, H Feinstein. Role-based Access Control Models[ J]. IEEE Computer, 1996,29 (6) :38-47.
  • 3D Ferraiolo, R Sandhu,et al. Proposed NIST Standard for Role-based Access Control [ J ]. ACM Transactions on Information and System Security(TISSEC) ,2001,4(3) :224-274.
  • 4R Thomas, R Sandhu. Task-Based Authorization Controls(TBAC) : A Family of Models for Active and Enterprise-Oriented Authorization Management[ C]. Lake Tahoe, CA: Proceedings of the 11th IFIP WG11.3 Conference on Database Security, 1997.
  • 5Gail-Joon Ahn, Myong Kang,et al. Injecting RBAC to Secure a Webbased Workflow System[ C]. ACM RBAC, 2000.
  • 6Sejong Oh, Seog Park. Task-role-based Access Control Model[ J ]. Information System, 2003, 28 : 533-562.
  • 7J Park, R Sandhu. Towards Usage Control Models: Beyond Traditional Access Control[ C]. Proceedings of the 7th ACM Symposium on Access Control Models and Technologies,2002.
  • 8R Sandhu, J Park. Usage Control : A Vision for Next Generation Access Control, MMM-ACNS [ EB/OL]. http://www. list. gmu. edu/conference_papers, htm, 2003.
  • 9Sonera Piazza Ltd MediaLab. Digital Rights Management. White Paper[ EB/OL]. http://www. medialab. sonera. fr/workspace./ DRM-WhitePaper. pdf, 2002.
  • 10史美林,杨光信,向勇,伍尚广.WfMS:工作流管理系统[J].计算机学报,1999,22(3):325-334. 被引量:291

共引文献307

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部