期刊文献+

RBAC模型的角色层次关系及授权管理研究 被引量:11

Research on the Role Hierarchy and Permission Management of the Role-Based Access Control Model
下载PDF
导出
摘要 针对RBAC96模型簇中角色私有权限处理存在的不足,本文提出把角色权限分为私有权限和公有权限;并且,在角色权限继承时,保证了角色的私有权限不被高层次的角色继承,高级角色只能继承低级角色的公有权限部分。针对RBAC96簇模型的普通角色继承所存在权限不能及时授予与回收的问题,给出了一种面向任务的RBAC策略方案,从而使得RBAC模型更好地发挥其优势。 Aiming at the shortcomings of role-permission inheritance privilege and extreme privilege in the relationship of role-permission assignment of the RBAC96 models, this paper suggests the role permissions he divided into private permissions and public ones;and in role-permission inheritance, the privatizing permission of a role will not he inherited by highlevel roles, which can only inherit its public permissions. Meanwhile, aiming at the problems in the RBAC96 models such as granting and reclaiming the authorities of roles, the conception of task is added to RBAC. Therefore, the RBAC model can exert its superiority better.
出处 《计算机工程与科学》 CSCD 2007年第4期36-37,50,共3页 Computer Engineering & Science
关键词 基于角色的访问控制 任务 私有权限 角色层次关系 RBAC task private permission role hierarchy
  • 相关文献

参考文献5

二级参考文献15

  • 1刘怀宇.基于角色的细粒度的访问控制系统的研究与实现[M].北京:北京航空航天大学计算机科学与工程系,1999..
  • 2刘怀宇,学位论文,1999年
  • 3SANDHU R S,COYNC E J,FCINSTCIN H L,et al.Role-based access control model [J]. IEEE Computer,1996,29(2) :38-47.
  • 4SANDHU R S,FERRAIOLO D,KUHN R. The NIST model for role-based access control: Towards a unified standard[A]. Proceedings of the Fifth ACM Workshop on Role Based Access Control [C]. Berlin, Germany:ACM, 2000: 47- 63.
  • 5JAEGER T,GIRAUD F,ISLAM N ,et al. A role-based access control model for protection domain derivation and management. [A] Proceedings of the Second ACM Workshop on Role-Based Access Control[C]. Fairfax,Virginia ,USA ..ACM, 1997: 95- 108.
  • 6EPSTEIN P,SANDHU R S. Towards a UML based approach to role engineering [A]. Proceedings of the Fourth ACM Workshop on Role-Based Access Control[C]. Fairfax, Virginia, USA: ACM, 19 9 9: 135 - 143.
  • 7SANDHU RAVI S,BHAMIDIPATI V,COYNE E,et al. The ARBAC97 model for role-based administration of roles: Preliminary description and outline[A]. Proceedings of the Second ACM Workshop on Role-Based Access Control [C]. Fairfax, Virginia, USA: ACM,1997: 41-50.
  • 8SANDHU RAVI S,MUNAWER Q. The ARBAC99model for administration of roles [A]. Proceedings 15th Annual Computer Security Applications Conference [C]. Phoenix,Arizona,USA: IEEE Computer Society,1999: 229-238.
  • 9FERNANDEZ E B,HAWKINS J C. Determining role rights from use casesIn[A]. Proceedings of the SecondACM Workshop on Role-Based Access Control [C].Fairfax,Virginia, USA: ACM, 1997: 121 - 126.
  • 10GIFFORD D K,JOUVELOT P,SHELDON M A,et al. Semantic file systems [A]. Proceedings of the Thirteenth ACM SIGOPS Symposium on Operating Systems Principles [C]. Pacific Grove, CA, USA:ACM,1991:16-25.

共引文献46

同被引文献56

引证文献11

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部