期刊文献+

一种信息系统授权机制的研究与应用 被引量:1

Research and Practice on Authorization Mechanism of Information System
下载PDF
导出
摘要 针对RBAC授权系统的原理,结合信息系统开发的实践,对应用RBAC授权机制问题进行深入浅出的研究。针对RBAC在应用中的某些问题,提出了其在模块设计、权限管理和安全体系等方面的要求,并对其实现进行详细说明。 This paper puts forward the theory of RBAC. Based on the requirement of the information system, the administration of authorization of RBAC is studied exhaustively. To overcome some problems of RBAC in the process of information system development, the author puts forward the requirements on design model, management authorization and security system, and explains these experiences in details.
作者 阮光册
机构地区 上海海关学院
出处 《计算机与数字工程》 2007年第11期59-61,共3页 Computer & Digital Engineering
关键词 RBAC 信息系统 授权机制 分级管理 安全体系 RBAC,information system,administration of authorization,grade management,security system
  • 相关文献

参考文献3

二级参考文献12

  • 1SANDHU R S,COYNC E J,FCINSTCIN H L,et al.Role-based access control model [J]. IEEE Computer,1996,29(2) :38-47.
  • 2SANDHU R S,FERRAIOLO D,KUHN R. The NIST model for role-based access control: Towards a unified standard[A]. Proceedings of the Fifth ACM Workshop on Role Based Access Control [C]. Berlin, Germany:ACM, 2000: 47- 63.
  • 3JAEGER T,GIRAUD F,ISLAM N ,et al. A role-based access control model for protection domain derivation and management. [A] Proceedings of the Second ACM Workshop on Role-Based Access Control[C]. Fairfax,Virginia ,USA ..ACM, 1997: 95- 108.
  • 4EPSTEIN P,SANDHU R S. Towards a UML based approach to role engineering [A]. Proceedings of the Fourth ACM Workshop on Role-Based Access Control[C]. Fairfax, Virginia, USA: ACM, 19 9 9: 135 - 143.
  • 5SANDHU RAVI S,BHAMIDIPATI V,COYNE E,et al. The ARBAC97 model for role-based administration of roles: Preliminary description and outline[A]. Proceedings of the Second ACM Workshop on Role-Based Access Control [C]. Fairfax, Virginia, USA: ACM,1997: 41-50.
  • 6SANDHU RAVI S,MUNAWER Q. The ARBAC99model for administration of roles [A]. Proceedings 15th Annual Computer Security Applications Conference [C]. Phoenix,Arizona,USA: IEEE Computer Society,1999: 229-238.
  • 7FERNANDEZ E B,HAWKINS J C. Determining role rights from use casesIn[A]. Proceedings of the SecondACM Workshop on Role-Based Access Control [C].Fairfax,Virginia, USA: ACM, 1997: 121 - 126.
  • 8GIFFORD D K,JOUVELOT P,SHELDON M A,et al. Semantic file systems [A]. Proceedings of the Thirteenth ACM SIGOPS Symposium on Operating Systems Principles [C]. Pacific Grove, CA, USA:ACM,1991:16-25.
  • 9乔颖,须德,戴国忠.一种基于角色访问控制(RBAC)的新模型及其实现机制[J].计算机研究与发展,2000,37(1):37-44. 被引量:75
  • 10李成锴,dislab.nju.edu.cn,詹永照,茅兵,谢立.基于角色的CSCW系统访问控制模型[J].软件学报,2000,11(7):931-937. 被引量:55

共引文献20

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部