期刊文献+

基于着色Petri网的GEO-RBAC策略验证 被引量:2

Verification of GEO-RBAC Policy Based on Colored Petri Net
下载PDF
导出
摘要 GEO-RBAC是一种能够处理空间信息的访问控制策略,其角色按照粒度分为角色模式和角色实例,按照维数分为空间角色和非空间角色。基于实例的角色分配与传统RBAC策略类似。使用着色Petri网对GEO-RBAC中基于模式的角色分配进行建模,并给出了可达性分析方法,通过对角色分配事件图可达状态的分析实现了GEO-RBAC策略的一致性验证。 GEO-RBAC policy can deal with spatial information. Roles in GEO-RBAC can be classified into role schemas and role instances according to granularity, or spatial roles and non-spatial roles according to dimension, The role assignment in instance level is similar to that in the traditional RBAC, Using colored Petri net we provide a CPN model for the role assignment in schema level and give the method to analyze the state reachability, at last, complete the consistency verification of the GEO-RBAC policy through analyzing the reachability of the corresponding occurrence graph.
出处 《系统仿真学报》 CAS CSCD 北大核心 2007年第A01期118-123,共6页 Journal of System Simulation
关键词 着色PETRI网 GEO-RBAC 策略 验证 Colored Petri Net GEO-RBAC policy verification
  • 相关文献

参考文献11

  • 1E Bertino, B Catania, M L Damiani. GEO-RBAC: A Spatially Aware RBAC [C]//In: Proc. of the 10^th ACM Symposium on Access Control Models and Technologies (SACMAT). 2005.29-37.
  • 2林闯.随机Petri网和系统性能评价[M].北京:清华大学出版社,2001.
  • 3袁祟义.Petri网原理[M].北京:电子工业出版社,1998..
  • 4K Jensen. Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use ,Volume 1 [M]. Springer Verlag, 1997.
  • 5K Knott. Dynamic Access Control Through Petri Net Workflows [C]//In: Proc. of the 16^th Annual Computer Security Applications Conference (ACSAC). 2000: 159-167.
  • 6K. Knott. Multilevel Security and Information Flow in Petri Net Workflows [C]// In: Proc. of the 9^th International Conference on Telecommunication Systems-Modeling and Analysis, Special Session on Security Aspects of Telecommunication Systems. 2001: 9-20.
  • 7Dong Xin, Chen Gang, Yin Jianwei, Dong Jinxiang. Petri-net-based Context-related Access Control Workflow Environment [C]//In: Proc. of the 7^th International Conference on Computer Supported Cooperative Work in Design. 2002: 381-384.
  • 8M Nyanchama, S Osborn. The Role Graph Model and Conflict of Interest [J]. ACM Transactions on Information and System Security (S1094-9224) , 1999, 2 (1): 3-33.
  • 9M Koch, L V Mancini, F Parisi-Presicce. A Graph-based Formalism for RBAC [J]. ACM Transactions on Information and System Security (S1094-9224) , 2002, 5(3): 332-365.
  • 10T Ahmed, A R Tripathi. Static Verification of Security Requirements in Role Based CSCW Systems [C]// In: Proc. of the 8^th ACM Symposium on Access Control Models and Technologies. 2003: 196-203.

共引文献15

同被引文献21

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部