期刊文献+

一种基于角色的访问控制系统方案 被引量:2

Research on Role-based Access Control System
下载PDF
导出
摘要 首先将角色概念引入到访问控制技术中,此方法与传统的访问控制技术相比具有面向实际应用的优点,尤其适合作为大型商务系统和组织管理系统中的安全访问控制机制,然后详细分析了基于角色访问控制的基本需求,提出了一种基于角色的访问控制系统方案,实现了系统开发过程中的职责分离,取得了较好的效果. The concept of the role is introduced into access control technology. Compared with the traditional access control technology, this method has the advantages of practical application and it is particularly suitable as a security access control mechanism for business organization and management systems. Then the paper analyzes in detail the basic needs of role - based access control, proposes a role - based access control system, which realizes separation of duties in the process of developing a system and achieves better results.
出处 《湖北民族学院学报(自然科学版)》 CAS 2007年第2期217-220,共4页 Journal of Hubei Minzu University(Natural Science Edition)
基金 湖北省科技攻关项目资助(2004AA210B01)
关键词 角色 权限 访问控制 role permission access control
  • 相关文献

参考文献8

二级参考文献15

  • 11,Ferraiolo D F, Kuhn R. Role-Based access control. In: Proceedings of the 15th National Computer Security Conference. Baltimore, MD, 1992. 554~563, http://hissa.ncsl.nist.gov/kuhn/
  • 22,Sandhu R, Samarati P. Access control: principles and practice. IEEE Communications, 1994,32(9):40~48
  • 33,Ramaswamy C, Sandhu R. Role-Based access control features in commercial database management systems. In: Proceedings of the 21st National Information Systems Security Conference. Virginia: U.S. Government Printing Office, 1998, http://www.list.gmu.edu/conferen.htm
  • 44,Sandhu R, Coyne E J, Feinstein H L et al. Role-Based access control models. IEEE Computers, 1996,29(2):38~47
  • 55 Sandhu R. Rationale for the RBAC96 family of access control models. In: Proceedings of the 1st ACM Workshop on Role-Based Access Control. ACM, 1997. http://www.list.gmu.edu/conferen.htm
  • 6段小平.ASP数据库系统开发实例导航[M].北京:人民邮电出版社,2003..
  • 7Ferraiolo D F,Barkley J F,Kuhn D R.A Role Based Access Control Model and Reference Implementation Within a Corporate Intranet ACM Transactions on Information Systems Security, 1999-02
  • 8Gavrila S I, Barkley J F. Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management. Third ACM Workshop on Role-based Access Control, 1998
  • 9Sandhu R, Coyne E J,Feinstein H L,et al. Role-based Access Control Models. IEEE Computer, 1996,29(2)
  • 10[美]FrankJ.Derfler.Jr.连网技术使用手册[M].北京:电子工业出版社,2000.

共引文献170

同被引文献17

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部