期刊文献+

Web系统功能权限管理研究 被引量:2

Research on authorization management on Web system
下载PDF
导出
摘要 提出Web系统权限管理基本思想,提出一种权限分类方法。根据该分类方法对每种类型的权限提出管理方案,阐述了RBAC,TBAC的基本思想,给出一种基于RBAC,TBAC的权限管理架构模型。该模型灵活有效地解决了Web系统中的动态权限管理问题。 This paper proposes the basic idea about authorization and a kind of classification. Based on the classification, it proposes a proposal to solve the problem, expounds the basic idea of RBAC and TBAC, presents a solution based on RBAC and TBAC. It solves authorization management problem highly active.
作者 吴愚 李炳法
出处 《信息技术》 2007年第2期102-105,共4页 Information Technology
关键词 权限管理 角色 RBAC TBAC authorization management role RBAC TBAC
  • 相关文献

参考文献6

  • 1暴志刚,胡艳军,顾新建.基于Web的系统权限管理实现方法[J].计算机工程,2006,32(1):169-170. 被引量:43
  • 2Sandhu R S,Coyne E J,Feinstein H L,et al.Role-Based access models[J].IEEE Computer,1996,29(2):38-47.
  • 3Barkley J F,Cincotta A V,Ferraiolo D F,et al.Role Based Access Control for the World Wide Web[C].Proc of 20th NIST-NCSC National Information Systems Security Conference,National Institute of Standards and Technology.Baltimore,Maryland,U.S.A:[s.n.],1997.
  • 4Ferraiolo D,Kuhn R.An Introduction to Role Based Access Control[Z].
  • 5徐松,赵曦滨,顾明.网格环境下的分布式RBAC模型框架[J].计算机工程,2006,32(6):163-166. 被引量:5
  • 6Thomas RK,Sandhu RS.Task-Based authentication controls (TBAC):a family of models for active and enterprise-oriented authentication management[M].1997:11-13.

二级参考文献11

  • 1Ferraiolo D, Kuhn R. An Introduction to Role Based Access Control[Z]. htto://csrc.nist.zov/rbac/.
  • 2程朝晖 李明升.中间件讲座之一:C/S与B/S不该成冤家[Z].http://software.ccidnet.com/pub/article/c379_a27157_p1.html.,.
  • 3.务实.J2EE体系结构设计[Z].http://www.zdnet.com.cn/developer/tech/story/0,2000081602,39174509-7,00.htm.,.
  • 4Foster I,Kesselman C.The Grid 2:Blueprint for a New Computing Infrastructure (2^nd Edition)[M].Morgan Kaufmann Press,2003.
  • 5Lau K W,Jarzabek S.A Generic Discretionary Access Control System for Reuse Frameworks[C].The Twenty-second Annual International Conference on Computer Software and Applications,1998-08-19:356-361.
  • 6Thomas T.A Mandatory Access Control Mechanism for the Unix File System[C].Fourth Aerospace Computer Security Applications Conference,1988-12-12:173-177.
  • 7Sandhu R S,Coyne E J,Feinstein H L,et al.Role-based Access Control Models[J].Computer,1996,29 (2).
  • 8Tuecke S.Grid Security Infrastructure (GSI) Roadmap[EB/OL].http://www.gridforum.org/security/ggfl-2001-03/drafts/draft-gridforum-gsi-roadmap-02.txt,2001.
  • 9Zhang Guangsen,Parashar M.Dynamic Context-aware Access Control for Grid Applications[C].Proceedings of Fourth International Workshop on Grid Computing,2003.
  • 10Freudenthal E.dRBAC:Distributed Role-based Access Control for Dynamic Coalition Environments[C].Proceedings of the 22^nd International Conference on Distributed Computing Systems,2002.

共引文献46

同被引文献19

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部