期刊文献+

基于RBAC模型的同名角色研究与设计 被引量:6

Design Study for Homonymous Role Based on RBAC
下载PDF
导出
摘要 安全模型既是可信信息系统的核心内容,也是可信计算研究的重要领域.基于对角色访问控制(RBAC:Role Based Access Control)和安全操作系统标准的深入研究,提出了同名角色的概念,扩展了RBAC中角色的控制范畴,便于灵活地权衡控制粒度与空间需求的对立关系,实施细粒度的访问控制;同时根据同名角色的思想,为自主存取控制(DAC:Discretionary Ac-cess Control)系统提供了同名控制域的能力.最后,在FreeBSD操作系统中设计实现了同名控制域,提高了访问控制的灵活性. The security model is the core content in the trusted information system and the key field of the trusted computing research. Based on the deep research of the RBAC (Role Based Access Control) model and the security operating system standard, we put forward the conception of the homonymous role, which could extend the control category of the role in RBAC. By the homonymous role, we can neatly balance the opposite relationship of the control granularity and the requirement of the storage space and carry the detailed access control into execution. Based on the idea of the homonymous role, we also provide the capability of the homonymous control domain for DAC (Discretionary Access Control) system. Finally, we design and implement the homonymous control domain in FreeBSD to enhance the flexibility of the access control.
出处 《小型微型计算机系统》 CSCD 北大核心 2007年第8期1402-1406,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金(60373088)资助
关键词 安全模型 可信计算 角色访问控制模型 同名角色 同名控制域 security mode trusted computing RBAC homonymous role homonymous control domain
  • 相关文献

参考文献6

  • 1Yu Zheng,Dake He,Yu Wei-chi,Tang Xiao-hu.Trusted computing-based security architecture for 4G mobile networks,parallel and distributed computing[C].Applications and Technologies,2005,PDCAT 2005.Sixth International Conference on,251-255.
  • 2Ferraiolo D,Cugini J,Kuhn D R.Role based access control (RBAC):features and motivations[C].Proc.1995 Computer Security Applications Conference,December 1995:241-248.
  • 3Ferraiolo D,Sandhu R,Gavrila S,et al.A proposed standard for role based access control[J].ACM Transactions on Information and System Security.August,2001,4(3):224-274.
  • 4Ouyang Kai,Zhou Jing-li,Xia Tao,Yu Sheng-sheng.An application-layer based centralized information access control for VPN[J].Journal of Zhejiang University (SCIENCE A) Feb.2006,7(2):240-249.
  • 5Robert Watson,Brian Feldman,Adam Migus,et al.Design and implementation of the TrustedBSD MAC framework[C].Third DARPA Information Survivability Conference and Exhibition,proceedings published by IEEE.,Washington,DC,April 2003,2:13-15.
  • 6Robert Watson,Wayne Morrison,Chris Vance,et al.The trustedBSD MAC framework:extensible kernel access control for freeBSD 5.0[C].USENIX Annual Technical Conference,San Antonio,TX,June,2003,1:38-49.

同被引文献32

引证文献6

二级引证文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部