期刊文献+

信息系统中角色交叉集散授权模型

Role-crossed Distributed Authorization Model in Information System
下载PDF
导出
摘要 为了能够准确、有效、安全的为信息系统用户授权,针对角色权限交叉带来管理混乱的现象,构建了角色交叉访问控制模型(Role-Crossed Access Control,简称RCAC).为了保证授权的可操作性和准确性,构建了向上查询授权人的集散授权方式,进而提出角色交叉集散授权模型.该方法已经在某信息系统得到应用. In order to authorize the information system users exactly, effectively and safely, the RoleCrossed Access Control (RCAC) model is built aiming at the managing disordered condition by the crossed role and privilege. To ensure the maneuverability and veracity of authorization, this paper builds the authorizer up-searching distributed authorization mode, and then puts forward the role-crossed distributed authorization model, so as to solve the role privilege-crossed authorization managing problem effectively. As used in an information system successfully, this method proves to be effective.
出处 《重庆工学院学报》 2007年第15期154-157,共4页 Journal of Chongqing Institute of Technology
基金 西南机动车驾驶员培训信息系统研究项目(7818-01)
关键词 信息系统 角色交叉 RCAC 集散授权 向上查询授权人 information system role-crossed RCAC distributed authorization authorizer Up-Searching
  • 相关文献

参考文献5

二级参考文献10

  • 11,D. Ferraiolo, J. Cugini, and D.R.Kuhn. Role Based Access Control: Features and Motivations. In Annual Computer Security Applications Conference. IEEE Computer Society Press, 1995
  • 22,D. Richard Kuhn. Mutual Exclusion of Roles As a Means of Implementing Separation of Duty in Role-Based Access Control Systems National Institute of Standards and Technology. Gaithersburg, Maryland 20899
  • 33,E. B. Fernandez and J. C. Hawkins. Determing Role Rights from Use Cases. ACM97
  • 44,J. F. Berkley. Comparing Simple Role Based Access Control Models and Access Control Lists. NIST. Gaithersburg, MD 1997
  • 55,Observations on the Real-World Implementation of Role-Based Access Control. http://www.schumannsoftware.com/.
  • 6Sandhu R S. Future direction in role - based access control models. In:Gorodetski V I, et al eds., Prec of the Mathematical Methods, Models,and Architectures for Network Security Systems. Lecture Notes in Computer Science 2052. Berlin: Springer, 2001:22 -26
  • 7Barka E, Sandhu R. Framework for role - based delegation models. The 16th Annual Computer Security Application Conf, Sheraton New Orleans, 2000
  • 8Sandhu B S, et al. Role- based access control models IEEE Computer, 1996;29(2): 38-47
  • 9朱虹,冯玉才.MIS系统的授权管理[J].计算机工程与应用,1999,35(3):72-74. 被引量:9
  • 10赵庆松,孙玉芳,孙波.RPRDM:基于重复和部分角色的转授权模型[J].计算机研究与发展,2003,40(2):221-227. 被引量:32

共引文献109

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部