期刊文献+

一种新的复杂信息系统访问控制模型 被引量:1

Novel complex information system access control model
下载PDF
导出
摘要 对现有基于任务—角色的访问控制模型(T-RBAC)进行了扩展,提出了面向用户的任务分配(UTA)和面向角色的权限分配(PRA)策略,有效地解决了企业信息系统中连带责任、面向用户的事务任务、面向用户的职责分离以及权限分配等问题。 This paper expanded task-role-based access control model, advanced some new strategy of user-oriented task assignment and role-oriented privilege assignment, which effectively solved the question of implicative responsibility, user-orien- ted business task, user-oriented separation of duties, and privilege' s assignment.
出处 《计算机应用研究》 CSCD 北大核心 2007年第8期42-44,47,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(10571112) 陕西省自然科学基金资助项目(2006F27)
关键词 信息系统 访问控制 连带责任 事务任务 职责分离 information system access control implicative responsibility transaction task separation of duties
  • 相关文献

参考文献8

  • 1宋善德,刘伟.基于任务-角色的访问控制模型[J].计算机工程与科学,2005,27(6):4-6. 被引量:16
  • 2SNYDER L.Formal models of capability-based protection systems[J].IEEE Trans on Computers,1981,30(3):172-181.
  • 3SANDHU R,COYNE E,FEINSTEIN H.Role-based access control models[J].IEEE Computer,1996,29(6):38-47.
  • 4THOMAS R K,SANDHU R.Task-based authentication controls (TBAC):a family of models for active and enterprise-oriented authentication management[C]//Proc of the IFIP WG11.3 Workshop on Database Security.London:Chapman & Hall,1997:166-181.
  • 5邓集波,洪帆.基于任务的访问控制模型[J].软件学报,2003,14(1):76-82. 被引量:222
  • 6OH S,PARK S.Task-role-based access control model[J].Information Systems,2003,28(6):533-562.
  • 7陈伟鹤,殷新春,茅兵,谢立.基于任务和角色的双重Web访问控制模型[J].计算机研究与发展,2004,41(9):1466-1473. 被引量:18
  • 8MILLER J A,FAN Mei,SHETH A P,et al.Security in Web-based workflow management systems[EB/OL].http://citeseer.ist.psu.edu/172884.html.

二级参考文献12

  • 1Rohit Khare. Web Security: A Matter of Trust. Sebastopol: O'Reilly & Associates Inc, 1997
  • 2Ferraiolo D, Kuhn R. Role-based access controls. In: Proc of the 15th NIST-NCSC National Computer Security Conference. Garthersburg, MD: National Institute of Standards and Technology, 1992. 554~563
  • 3Sandhu R, Conyne EJ, Lfeinstein H, et al. Role based access control models. IEEE Computer, 1996, 29(2): 38~47
  • 4Park Joon S, Sandhu R, Ahn Gail-Joon. Role-based access control on the Web. ACM Trans on Information and System Security, 2001, 4(1): 37~71
  • 5Thomas R K, Sandhu R. Task-based authentication controls (TABC): A family of models for active and enterprise-oriented authentication management. In: Proc of the IFIP WG11.3 Workshop on Database Security. London: Chapman & Hall, 1997. 166~181
  • 6D kristol, L Montulli. HTTP state management mechanism. RFC 2965, Network Working Group, Internet Engineering Task Force. http://www.ietf.org/rfc/rfc2965.txt, 2000
  • 7R K Thomas, R S Sandhu. Task-Based Authentication Controls (TABC): A Family of Models for Active and Enterprise-Oriented Authentication Management[A]. Proc of the IFIP WG11.3 Workshop on Database Security[C]. 1997.11-13.
  • 8R Sandhu, E J Conyne, H Lfeinstein, et al. Role-Based Access Control Models[J]. IEEE Computer, 1996, 29(2): 38-47.
  • 9Sejong Oh, Seog Park. An Improved Administration Method on Role-Based Access Control in the Enterprise Environment[J]. Journal of Information Science and Engineering, 2001,17(6): 924-994.
  • 10Andreas K Mattas, Ioannis K Mavridis, George I Pangalos.Towards Dynamically Administered Role-Based Access Control[A]. Proc of the 14th Int'l Workshop on Database and Expert System Applications[C]. 2003. 494-498.

共引文献240

同被引文献7

  • 1Workflow Management Coalition [ EB/OL]. http ://www. wfmc..org.
  • 2Enhydra Shark project [ EB/OL]. http://www. enhydra, org/work- flow/shark.
  • 3SEJONG O H, SEOG P. Task-role-based access control model[ J]. Information Systems,2003,28(6) :533-562.
  • 4AALST Wvan der, HEE K van.工作流管理:模型、方法和系统[M].王建民,闻立杰,译.北京:清华大学出版社,2004.
  • 5LI Hong-chen,YANG Yun, CHEN T Y. Resource constraints analysis of workflow specifications[J]. Journal of System and Software, 2004,73(3) :271-285.
  • 6WU Sheng-li, SHETH A, MILLER J, et al. Authorization and access control of application data in workflow system[ J]. Journal of Intelligent Information Systems,2002,18 ( 1 ) : 71 - 94.
  • 7CHAARI S, BIENNIER F, BEN A C, et al. An authorization and access control model for workflow [ J ]. IEEE Computer, 2004,6 (4) : 141-148.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部