期刊文献+

基于角色的访问控制在多应用层CIMS中的应用 被引量:4

Application of Role-based Access Control in Multi-application-layers CIMS System
下载PDF
导出
摘要 为了管理多应用层系统中的资源权限,充分利用RBAC在安全管理中的优势,提出了一个将RBAC融于多应用层的安全模型——Multi-RBAC。它将RBAC合理实施到系统的各个应用层,管理位于不同应用层的系统资源权限。由于角色由各应用层的资源访问权限来定义,使角色划分更加合理、粒度更小,也更容易实现权限最小原则。同时,可充分结合各种先进的RBAC模型,满足多应用层下各种安全需求。在实现上,应用Multi-RBAC成功开发并实施了一套CIMS安全管理系统,表明该模型是可行的。 In order to manage the privileges in muhi-application-layers system and make use of the advantage of RBAC in security management, Multi-RBAC, a RBAC model that can be applied in all application-layers was presented. It was applied to all application-layers of system to protect the resources in different layers. Since the roles were defined by the resource privilege in different layers, the Multi-RBAC made the classifying of roles more reasonable, the granularity less and the realization of least-privilege principle easier. Furthermore, all requirements of security can be satisfied with the help of other advanced RBAC model. In application, a security management system of CIMS was developed and applied successfully, which showed that the model is feasible'.
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2007年第2期140-144,共5页 Journal of Sichuan University (Engineering Science Edition)
基金 国家863/CIMS主题资助项目(2003AA411210)
关键词 基于角色的访问控制 安全模型 应用层 多应用层CIMS系统 role-based access control security model application-layer multi-application-layers CIMS system
  • 相关文献

参考文献9

二级参考文献36

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2陆荣杰,刘知贵,黄晓芳.J2EE中基于容器管理的Web客户端安全验证[J].兵工自动化,2005,24(3):47-48. 被引量:4
  • 3[3]Sandu R S, Coyne E J, Feinstein H L. Role-based access control models[J]. IEEE Computer, 1996,29(2) :38 ~47
  • 4[4]Ferraiolo D F, et al. Proposed NIST standard for role-based access control[J]. ACM Transactions on Information and Systems Security (TISSEC), 2001,4(3) :224 ~274
  • 5[5]Ravi Sandhu, Samarati P. Access control: principles and practice[J]. IEEE Communications, 1994,32(9) :40 ~48
  • 6[6]Lin A, Brown R. The application of security policy to role-based access control and the common data security architecture [ J ].Computer Communications, 2000,23(17) :1584 ~ 1593
  • 71,Ferraiolo D F, Kuhn R. Role-Based access control. In: Proceedings of the 15th National Computer Security Conference. Baltimore, MD, 1992. 554~563, http://hissa.ncsl.nist.gov/kuhn/
  • 82,Sandhu R, Samarati P. Access control: principles and practice. IEEE Communications, 1994,32(9):40~48
  • 93,Ramaswamy C, Sandhu R. Role-Based access control features in commercial database management systems. In: Proceedings of the 21st National Information Systems Security Conference. Virginia: U.S. Government Printing Office, 1998, http://www.list.gmu.edu/conferen.htm
  • 104,Sandhu R, Coyne E J, Feinstein H L et al. Role-Based access control models. IEEE Computers, 1996,29(2):38~47

共引文献111

同被引文献25

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部