期刊文献+

RBAC在网络管理上的应用 被引量:1

Application of RBAC to Administration of Networks
下载PDF
导出
摘要 基于角色的访问控制(RBAC)是一种方便、安全、高效的访问控制机制。通过分析RBAC的模型特点及应用优势,结合著名的MikroTik RouterOS路由软件和教学实际情况,对网络管理进行了改进,给出了基于角色的网络访问控制方案。引入角色这个中间桥梁,使权限与角色对应,角色与用户对应。将角色在应用层面上定义,使访问粒度更细,安全性加强。经使用,此方案更具有方便性和安全性。 RBAC (role based access control) as a convenient, safe and efficient mechanism has proved high flexibility and safety, which by analyzing features of RBAC and its application advantages, combining well- known MikroTik RouterOS and teaching practices, improves network management and offers RBAC solution. By introducing roles as medium, produces an agreement between roles and users, by defining roles at application lever, gets more intensive accessing granularity and reinforced .safety.
出处 《计算机技术与发展》 2007年第3期166-168,共3页 Computer Technology and Development
关键词 基于角色的访问控制 角色 权限 RBAC role permission
  • 相关文献

参考文献7

二级参考文献18

  • 1[1]Sandhu, R. Issues in RBAC . In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 21~24.
  • 2[2]Jaeger, T. On the increasing importance of constraints. In: Proceedings of 4th ACM Workshop on Role-Based Access Control. Fairefax, VA: ACM Press, 1999. 33~42.
  • 3[3]Ahn, G.-J. The RCL2000 language for specifying role-based authorization constraints [Ph.D. Thesis]. Fairfax, VA: George Mason University, 1999.
  • 4[4]Sandhu, R., Coyne, E.J., Feinstein, H.L., et al. Role-Based access control models. IEEE Computer, 1995,29(2):38~47.
  • 5[5]Chen, Fang, Sandhu, R. Constraints for role-based access control. In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 39~46.
  • 6Ravi S Sandhu, David Ferraiolo,Richard Kuhn. The NIST Model for Role-based Access Control: Towards an Unified Standard [ J/OL ].ACM. 2000.47-63.
  • 7David F Feraiolo, Ravi Sandhu,Serban Gavrila, et al. Proposed NIST Standard for Role-based Access Control[ J]. ACM Transactions on Information and System Security, 2001, (3) :224-274.
  • 8Ravi Sandhu, Edward J Coyne. Roie-based Access Control Models[ J]. Computer,1996, (2) :38-47.
  • 9Sandhu R, Bhamidipati V, Munawer Q. The ARBAC97 Model for Role-based Administration of Roles[ J]. ACM Trans. on Information and Systems Security, 1999, ( 1 ) : 105-135.
  • 10Sylvia Osbom, Yuxia Guo. Modeling Users in Role-based Access Control[ C]. Berlin:Proceedings of the 5th ACM Workshop on Rolebased Access Control( RBAC-00), 2000.26-27.

共引文献116

同被引文献11

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部