期刊文献+

一种扩展的基于角色访问控制模型ERBAC的研究及其应用

Study and Application of an Extended Role-Based Access Control Model
下载PDF
导出
摘要 访问控制是系统安全的重要技术。对常用的几种访问控制策略进行了比较,介绍了RBAC模型的基本概念及其特点、优势和不足;着重研究了一种对用户和角色混合授权的ERBAC模型,分析了ERBAC模型的优点;最后对ERBAC模型提出改良意见,建立了改良模型;并介绍其在某大型系统中的有效应用和实现。 Access control is an important technology in system security.The commonly used access control policies,describes the RBAC model's basic concepts and its features,advantages and disadvantages is compared.An extended role-based access control model is intensively studied,which integrated the authorization of users and roles,and analyzed the advantages of the ERBAC model.At last several improved suggestions are proposed to the ERBAC model,an improved model is built.and its effective application and implementation in a large-scale system are introduced.
出处 《科学技术与工程》 2007年第21期5558-5562,共5页 Science Technology and Engineering
关键词 角色 访问控制 权限 ERBAC模型 role access control permission ERBAC model
  • 相关文献

参考文献7

二级参考文献34

  • 1程玉松,孟丽荣,盛琦,刘学波,柳楠.利用规则RBAC模型实现门户的安全访问控制[J].计算机工程与设计,2005,26(5):1299-1301. 被引量:11
  • 2李卿,乔元松,郑慧.角色分离的层次化RBAC模型[J].计算机工程与设计,2005,26(6):1563-1565. 被引量:7
  • 3李帆,郑纬民.基于角色与组织的访问控制模型[J].计算机工程与设计,2005,26(8):2136-2140. 被引量:27
  • 4邓集波 洪帆.基于任务的授权模型.软件学报,2003,14(1):76~82.http://www.jos.org.cn/1000-9825/14/76.htm.,.
  • 5Fcrraiolo DF, Sandhu R, Guirila S, Kuhn DR, Chandramouli R. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 2001,4(3):224-274.
  • 6Botha RA, Eloff JHP. Access control in document centric workflow system: an agent-based approach. Computers & Security, 2001,20(6):525-532.
  • 7Wu SL, Sheth A, Miller J, Luo ZW. Authorization and access control of application data in workflow system. Journal of Intelligent Information System, 2002,18(1):71 -94.
  • 8Bertino E, Bonatti PA, Ferrari E. TRBAC: A temporal role-based access control model. ACM Transactions on Information and System Security, 2001,4(3): 191-223.
  • 9Ferraiolo DF, Sandhu R, Gavrila S. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 2001,4(3):224-274.
  • 10Osbom S, Sandhu R. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, 2000,3(2):85-106.

共引文献156

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部