期刊文献+

基于角色映射和PBNM的多域安全访问控制模型 被引量:5

Multi-domain access control policy model based on role mapping and PBNM
下载PDF
导出
摘要 在分析多安全域间基于RBAC角色映射和PBNM模型的基础上,提出了多域用户之间的安全访问策略配置模型。该模型通过域间角色映射信息来配置域间访问控制策略,在域内则采用基于PBNM的模型机制配置域内用户安全策略,最终解决了在多域间资源访问控制的安全问题。 The paper introduced a multi-domain security access control model based on RBAC role mapping and PBNM( policy based network management) model. While providing inter-domaln access policy through role mapping, the model provided intra-domain access control policy based PBNM to achieve automatic security policy configuration in multi-domains.
出处 《计算机应用研究》 CSCD 北大核心 2008年第3期888-890,共3页 Application Research of Computers
基金 2005年度国家发改委信息安全重大专项基金资助项目(NSS-2)
关键词 自治安全域 角色映射 基于角色的访问控制 安全策略 autonomy secure domain role mapping RBAC( role based access control) security policy
  • 相关文献

参考文献11

  • 1章志明,张正球,余敏.一种基于RBAC的多个域之间安全访问控制[J].计算机工程,2005,31(15):135-136. 被引量:9
  • 2BARRERE F, BENZEKRI A, GRASSET F, et al. Automated interdomain security policy generation[ C ]//Proc of the 11 th Workshop of the HP OpenView University Association. Paris : [ s. n. ], 2004 : 20- 23.
  • 3SANDHU R. Role-based access control models[ J]. IEEE Computer, 1996,29(2) :38-47.
  • 4TMF GB917 v2.0, Service level agreement (SLA) management handbook[S]. 200d.
  • 5BARRERE F, BENZEKRI A, GRASSET F, et al. A multi-domains security policy distribution architecture for dynamic IP based VPN management[ C ]//Proc of the 3rd International Workshop on Policies for Distributed Systems and Networks. 2002:224-227.
  • 6朱贤,洪帆,段素娟.多域间安全互操作的信任传播策略[J].计算机工程与科学,2005,27(6):15-17. 被引量:2
  • 7CHAN K, SELIGSON J, DURHAM D,et al. COPS usage for policy provisioning(COPS-PR) [ EB/OL ]. ( 2001- 03 ). http ://www. ieff. org/rfc/rfc3084, txt? number = 3084.
  • 8VERMA D C. Simplifying network administration using policy based management [ J ]. IEEE Network, 2002,3 6 (2) :20- 26.
  • 9SAFAVI-NAINI R, SUSILO W, GATUS G. Policy distribution using COPS-PR in a distributed firewall[ C ]//Proc of Australian Telecommunications Networks & Applications Conference. Australia : [ s. n. ], 2004 : 60 - 67.
  • 10苗莽.策略化的安全策略集中管理模型研究[J].网络安全技术与应用,2005(2):42-44. 被引量:3

二级参考文献13

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2Sandhu R S,Samarati P.Authentication,Access Control,and Intrusion Detection.In:ACM Computing Surveys,50th Anniversary Comme-morative Issue,1996,28(1)
  • 3Object Management Group.CSI:Common Secure Interoperability.Technical Report,1996
  • 4Object Management Group.CORBA 2.3.1/IIOP Specification.Techni-cal Reprot ,1999
  • 5M Blaze, J Feigenbaum, J Ioannidis, et al. The KeyNote Trust-Management. Version 2[R]. RFC 2704, 1999.
  • 6C Ellison, B Frantz, B Lampson, et al. SPKI Certificate Theory[R]. RFC 2693, 1999.
  • 7L Ninghui, W H Winsborough, J C Mitchell. Distributed Credential Chain Discovery in Trust Management (Extended Abstract) [A]. Proc 8th ACM Computer and Communication Security (CCS01)[C]. 2001. 156-165.
  • 8E Freudenthal,T Pesin, L Port, et al. dRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments[R]. Technical Report TR2001-819, New York University, 2001.
  • 9L Ninghui. Delegation Logic: A Logic-Based Approach to Distributed Authorization[J]. ACM Trans on Information and System Security, 2003, 6 (1): 128-171.
  • 10D D Clark, D R Wilson. A Comparison of Commercial and Military Computer Security Policies[A]. Proc of 1987 IEEE Symp on Security and Privacy[C]. 1987. 184-194.

共引文献21

同被引文献42

引证文献5

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部