期刊文献+

一种基于SDL的角色系统描述框架 被引量:1

A SDL-based role system description framework
下载PDF
导出
摘要 将SDL(standard deontic logic)引入到角色管理系统,提出一种基于SDL的角色系统描述框架SBDF(SDL-based role systemdescription frame).在该框架中,对系统中的角色进行分类.提供一系列的逻辑谓词,通过对各类角色的操作行为进行规范化描述,从而达到提供系统安全级别的目的.同时,为提高角色行为执行的效率,引入Agent技术,由Agent执行各角色的具体操作,通过对系统进行描述,方便对用户及角色的管理,提高了系统的安全级别. SDL(standard deontic logic), as a set of logic reasoning specifications, is introduced to role management system, and a description framework, called SBDF(SDL-based role system descrpion frame) is proposed in the paper. In SBDF, roles are classified, and theirs actions are expressed by a series of predicates. Meanwhile, agents are introduced to perform the actions of all kinds of roles, so as to enhance execution efficiency and security level.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2008年第2期66-69,共4页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
关键词 访问控制 标准义务逻辑 授权 角色 策略冲突 access control standard deontic logic(SDL) authorization role policy conflict
  • 相关文献

参考文献6

  • 1李立新,陈伟民,黄尚廉.强制访问控制在基于角色的安全系统中的实现[J].软件学报,2000,11(10):1320-1325. 被引量:48
  • 2Saunders G, Hitchens M, Varadharajan V. Role- Based access control and the access control matrix[C] //Proceedings of the ACM SINGOPS Operating Systems Review. New York: ACM Press, 2001: 6-20.
  • 3梁彬,孙玉芳,石文昌,孙波.一种改进的以基于角色的访问控制实施BLP模型及其变种的方法[J].计算机学报,2004,27(5):636-644. 被引量:30
  • 4Liao Zhensong, Jin Hai, Zou Deqing. A logic predicate automated trust negotiation model[C] // Proceedings of the 2nd International Conference on Communications and Networking in China (ChinaCom 2007). Shanghai: [s. n.], 2007: 22-24.
  • 5Laurence C, Frederic C. Analyzing consistency of security policies [C] //Proceedings of the 1997 IEEE Symposium on Security and Privacy. New York: IEEE Press, 1997: 103-112.
  • 6Hangkon K. A framework for security assurance in component based development [C]//Proceedings of 2004 International Conference on Computational Science and its Applications (ICCSA 2004). Heidelberg: Springer Press, 2004: 587-596.

二级参考文献15

  • 1Sanhu R S,IEEE Computer,1996年,29卷,2期,38页
  • 2Lunt T F,Research Directions in Database Security,1992年,98页
  • 3Sandhu R., Coyne E.J., Feinstein H.L.,Youman C.E.. Role-based access control model. IEEE Computer, 1996, 29(2): 38~47
  • 4Bell D., LaPadual L.J..Secure computer system: Unified exposition and MULTICS interpretation. MITRE Corporation, Bedford, Mass: Technical Report MTR-2997, 1976
  • 5Lin T.. Bell and LaPadula Axioms: A "new" paradigm for an "old" model. In: Proceedings of the 1992~1993 ACM SIGSAC New Security Paradigms Workshop, Little Compton, 1993, 82~93
  • 6Bell D.. Secure computer systems: A network interpretation. In: Proceedings of the 2nd Aerospace Computer Security Conference, McLean, 1986, 32~39
  • 7Smalley S., Fraser T.. A security policy configuration for the security-enhanced Linux. NAI Labs, Technical Report, 2001
  • 8Mayer F.. An interpretation of a refined Bell-La padula model for the TMach kernel. In: Proceedings of the 4th Aerospace Computer Security Conference, Orlando, FL, 1988, 368~378
  • 9Sandhu R.. Role activation hierarchies. In:Proceedings of the 3rd ACM Workshop on Role-based Access Control, FariFax, 1998, 33~40
  • 10Sandhu R.. Role hierarchies and constraints for lattice-based access controls. In: Proceedings of Computer Security--ESORICS 96, Rome, 1996, 65~79

共引文献75

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部