期刊文献+

基于角色的分布式异构系统的研究

Research of Role Based Distribute And Heterogeneous System
下载PDF
导出
摘要 本文建立了分布式异构数据库的简单访问模型,对核心部分封装器的构造进行理论研究,引用集合的观点,分别对角色,权限及角色权限关系以等价类和函数映射的方法进行理论研究。实际中在数据库之上建立中间层封装器,提供统一的角色访问接口在中间层实现角色权限的对应数据表的转换,实现各数据库之间的角色权限访问。在此基础上对RBAC的互斥,职责分离,继承等性质做了一般的讨论。 This paper build a simple DHD access model, discusses the construction of encapsulater which is core part in theory with set view, which include role, permission and relationship through the way of equivalent class and function mapping.The M-E(mediator - encapsulater) is built above the database in fact and supplies uniform role access interface for exchanging data and realizing role permission access between databases. Further more RBAC's properties of mutex, separation of duty and inheritance are discussed in general.
出处 《微计算机信息》 北大核心 2007年第24期157-159,共3页 Control & Automation
基金 国家自然科学基金资助项目(60573124)
关键词 角色访问控制 异构数据库 划分 等价类 RBAC, DHD, Division, Equivalent class
  • 相关文献

参考文献6

  • 1David F. Ferraiolo, Ravi Sandhu, Serban Gavrila Proposed NIST Standard for Role-Based Access Control ACM Transactions on Information and System Security, Vol. 4, No. 3, August 2001, Pages 224 - 274.
  • 2Sanhu R S,Coyne E J, Feinstein H L, et al. Role-based Access Models. IEEE Computer,1996,29(2):38-47
  • 3Horst F.Wedde, Mario Lischka. Role Based Access Control in Ambient and Remote Space: 2004 ACM 1581138725/04/0006
  • 4Sandhu R, Munawer Q. The RRA97 Model for Role-based Administration of Role Hierarchies. In Proceedings of 14th Annual Computer Security Application Conference, Scotsdale, A Z, 1998- 12:39-49
  • 5Sandhu R, Ferraiolo D, Kuhn R. The NIST Model for Role-based Access Control: Towards A Unified Standard. ACM RBAC / 2000
  • 6邹晓.基于角色的访问控制模型分析与实现[J].微计算机信息,2006,22(06X):108-110. 被引量:21

二级参考文献5

  • 1李胜先,王全德,陈义,李祥和.Windows下基于主机的访问控制研究与实现[J].微计算机信息,2005,21(11X):21-23. 被引量:7
  • 2Sandhu R,Samarati P.Acccess Control: Principle and Practice[J].IEEE Communications Magazine,1994,32(9):40-48
  • 3Sandhu R,Coyne E J.Role-based Access Control Models[J].IEEE Computer, 1996,29(2):38-47
  • 4Sandhu R,Bhamidipati V. The ARBAC97 Model for Role-based Administration of Roles:Preliminary Description and Outline [C].Proceedings of the 2th ACM Workshop on Role-based Access Control,ACM,1997.154-183
  • 5Ferraiolo D F,Barkley J F.Specifying and managing role-based access control within a corporate intranet[A].Proceedings of Second ACM Workshop on Role-Based Access Control[C],1997,77-82

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部