期刊文献+

身份认证及RBAC技术在MIS中的应用研究

Application research on identity authentication and RBAC technology in MIS
下载PDF
导出
摘要 通过对DBSS进行相应的设计扩展,重新构建了DBSS模型。建立了一个基于改进的身份认证模型,提供了客户端应用程序到应用服务器的数据库系统安全解决方案。定义了不同的角色关系和操作权限集,给出了角色控制模块中功能层的权限管理以及数据库访问权限管理的实施方法。 In this paper the corresponding design expansion of DBSS is made, and the DBSS framework model fit for the database is built. An identity protocol model aimed to improve the Kerberos protocol is put forward to provide a scheme of database security from client application program to application server A diverse role relation and the operation authority collection are defined, and the realization method of the permission management of both function layer in role controller module and database access is advanced.
作者 石中盘
出处 《燕山大学学报》 CAS 2007年第4期352-355,共4页 Journal of Yanshan University
关键词 DBSS ERBAC 身份认证 KERBEROS协议 DBSS ERBAC identity authentication Kerberos protocol
  • 相关文献

参考文献4

二级参考文献30

  • 1袁平鹏,陈刚,董金祥.多政策的两层协同应用存取控制模型[J].计算机辅助设计与图形学学报,2004,16(4):420-426. 被引量:19
  • 2WFMC.TC00-1019:Workflow Management Coalition Workflow Security Considerations White Paper.1998.
  • 3Ravi S Sandhu et al.Role-based Access Control Models[J].IEEE Computer, 1996; 38-47.
  • 4Savith Kandala,Ravi Sandhu.Secure Role-Based Workflow Models. http ://www.list.gmu.edu/confrnc/ifi p/i01-rbwm.pdf.
  • 5Vijayalakshmi Atlurl ,Wei-Kuang Huang.An Authorization Model for Workflows[C].In :Proc of the Fifth European Symposium on Research in Computer Security, 1996.
  • 6Vijayalakshmi Atlufi ,Wei-Kuang Huang.A Petri Net Based Safety Analysis of Workflow Authorization Models[J].Journal of Computer Security, 1999.
  • 7Bertino E,Bonatti PA,Ferrari E.TRBAC:A temporal role-based access control model[J].ACM Transactions on Information and System Security,2001 ;4(3) : 191-223.
  • 8Ravi S Sandhu.Separation of Duties in Computerized Information Systems[C].In:Sushil Jajodia,Carl Landwehr eds.Database Security, IV:Status and Prospects,North Holland,1991:179-189.
  • 9Nabil R Adam, Vijayalakshmi Atluri, Wei-Kuang Huang.Modeling and Analysis of Workflows Using Petri Nets[J].Journal of Intelligent Information Systems, 1998; 10(2) : 1-29.
  • 10David F Ferraiolo,Ravi Sandhu,Serban Gavrila et al.Proposed NIST Standard for Role-Based Access Control[J].ACM Transactions on Information and Systems Security,2001 ;4(3):224-274.

共引文献109

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部