期刊文献+

一种通用访问控制管理模型 被引量:8

A Generic Access Control Administration Model
下载PDF
导出
摘要 目前的访问控制管理模型都是针对某种特定的访问控制模型提出的,不能适应多访问控制模型共存于一个大型系统的情况,一个管理模型不能同时适用于多访问控制模型的主要原因是管理者管理范围定义包含了某种访问控制模型中特有的组件.通过使用各种访问控制模型中共有的主体和权限来定义管理模型中的管理范围,将管理模型与访问控制模型之间的关系抽象为一个用于计算策略相关管理范围的函数,提出了一种能够用来管理不同访问控制模型的通用访问控制管理模型,为了便于模型实际使用,在模型中引入管理空间的概念与实际组织结构相对应,形成分布式访问控制管理结构,同时模型严格区分了管理空间的直接管理者和间接管理者在管理权限上的不同,使得管理者具有一定的自治性.最后讨论了管理模型中的管理规则和语义,证明了模型的完备性,并讨论和分析了针对不同访问控制模型的policy*算法. Current access control administration models that are designed to manage given access control models are not suitable for enterprise environment in which different access control models coexist. An administration model is needed for efficiently administrating different access control models in enterprise environment. The main reason why an administration model can't be used to manage other access control models is that the administration scopes defined in the model include characteristic components of the given access control model. This paper uses subiect and permission that are common in different access control models to describe administration scope, abstracts interface between administration model and access control model to policy ~ functions and proposes a generic administration model. The model introduces the concept of management space that corresponds with real enterprise structure and makes the model easily understood by managers, and the administration tasks are achieved hierarchically. For autonomy, the model differentiates the direct manager's administration privileges from the indirect manager's administration privileges of one management space. Also discussed are the administration rules and semantics of the model. The model soundness is proved, and policy~ algorithms of RBAC, MAC and HRU are analyzed. This model can be used to administrate different access control model in an enterprise environment. An example is given, which explains how to use this model to manage RBAC, MAC and HRU.
出处 《计算机研究与发展》 EI CSCD 北大核心 2007年第6期947-957,共11页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60603017) 国家"八六三"高技术研究发展计划基金项目(2004AA147070)~~
关键词 访问控制 管理模型 基于角色的访问控制 信息安全 强制访问控制 access control administration model RBAC information security mandatory access control
  • 相关文献

参考文献13

  • 1M Harrison,W Ruzzo,J Ullman.Protection in operating systems[J].Communications of the ACM,1976,19(8):461-471
  • 2R S Sandhu,E J Coyne,H L Feinstein,el al.Role-based access control models[J].IEEE Computer,1996,29(2):38-47
  • 3D Bell,L Lapadula.Secure computer system:Unified exposition and multics interpretation[R].Electronics Systems Division,Bedford USAF Base,DoD,Tech Rep:ESD-TR-75-306,1976
  • 4Ravi Sandhu,Bhamidipati,Qamar Munawer.The ARBAC97 model for role-based administration of roles[J].ACM Trans on Information and Systems Security(TISSEC),1999,2(1):105 -135
  • 5Ravi Sandhu,Qamar Munawer.The ARBAC99 model for administration of roles[C].The 15th Annual Computer Security Applications Conference(ACSAC'99),Scottsdale,Arizona,USA,1999
  • 6Jason Crampton,George Loizou.Administrative scope:A foundation for role-based administrative models[J].ACM Trans on Information and System Security,2003,6(2):201-231
  • 7Sejong Oh,Ravi Sandhu.A model for role administration using organization structure[C].The 7th ACM Syrup on Access Control Models and Technologies (SACMAT 2002),Monterey,California,2002
  • 8Thomas H Cormen,Charles E Leiserson,Ronald L Rivest,et al.Introduction to Algorithm,Second Edition[M] J.Cambridge:The MIT Press,2001
  • 9Dorothy E Denning.A lattice model of secure information flow[J].Communications of the ACM,1976,19(5):236-243
  • 10Hilary H Hosmer.The multipolicy paradigm for trusted systems[C].The 1992-1993 Workshop on New Security Paradigms,Little Compton,Rhode Island,United States,1993

二级参考文献11

  • 1Ravi Sandhu, Edward Coyne, Hal Feinstein, et al. Role-based access control models. IEEE Computer, 1996, 29(2):38-47
  • 2Xinwen Zhang, Sejong Oh, Ravi Sandhu. PBDM: A flexible delegation model in RBAC. In: Proc. SACMAT'03. New York:ACM Press, 2003
  • 3Roberto Tamassia, Danfeng Yao, William H, Winsborough.Role-based cascaded delegation. In: Proc. SACMAT'04. New York: ACM Press, 2004
  • 4Ezedin Barka, Ravi Sandhu. Framework for role-based delegation models. In: Proc. 16th Annual Computer Security Application Conference (ACSAC2000). Los Alamitos, CA: IEEE Computer Society Press, 2000
  • 5Ezedin Barks, Ravi Sandhu. A role-based delegation model and some extensions, The 23rd National Information Systems Security Conference (NISSC 2000), Baltimore, USA, 2000
  • 6Longhua Zhang, Gail-Joon Ahn, Bei-Tseng Chu. A rule-based framework for role based delegation. In: Proe, SACMAT' 01,New York: ACM Press, 2001
  • 7Ye Chunxiao, Fu Yunqing, Wu Zhongfu. An attribute-based-delegation-model, The 3rd Int'l Conf. Information Security,Shanghai, 2004
  • 8Ravi Sandhu, Qamar Munawer. A model for role administration using organization. In: Proc. SACMAT'02. New York: ACM Press, 2002
  • 9Cheh Goh, Adrian Baldwin. Towards a more complete model of role. In: Proc. RBAC'98. New York: ACM Press, 1998
  • 10Mohammad Abdullah AI-Kshtani. A family of models for rule-based user role assignment: [Ph. D. dissertation]. Fairfax, VA:George Mason University, 2003

共引文献16

同被引文献75

引证文献8

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部