期刊文献+

基于X-RBAC模型的访问控制方法研究与实践 被引量:3

Research and Implementation of Access Control Based on the Extended Role-Based Access Control(X-RBAC) Model
下载PDF
导出
摘要 传统的RBAC模型基于一套角色不能同时为用户选择功能主体,规范数据操作行为和数据操作对象。为解决此问题,本文提出了X-RBAC模型。该模型通过引入角色组的概念并在其中定义了功能角色组、行为角色组和数据角色组,通过功能角色实现功能主体的过滤,行为角色实现数据操作行为的过滤,数据角色实现数据客体的过滤。在对用户进行授权的同时授予用户功能角色、行为角色和数据角色,以保证授权用户对授权数据执行授权操作。实践表明,X-RBAC模型具有良好的扩展性、适应性和灵活性,适用于数据保密性要求高的复杂信息系统的访问控制。 Traditional role-based access control can not filter the functional entities, data operations and business data at one time, because it has only one set of roles. To resolve this problem, we extend it by importing the concept of role group and defining three role groups, i.e. functional role group, behavioral role group and data role group. Functional roles are used to filter the functional entities; behavioral roles are used to restrict the data operation activities; and data roles are used to filter the business data. We assign at least a functional role, a behavioral role and a data role to every user, so as to ensure only the authorized user can do the authorized data operation activities on the authorized data. Applications indicate that, the extended role based access control model possesses favorable expansibility, adaptability and flexibility, and it can be used as the access control model for complex information systems with a high demand of data security.
出处 《计算机工程与科学》 CSCD 2008年第6期22-25,共4页 Computer Engineering & Science
关键词 访问控制 基于角色的访问控制 角色组 功能角色 行为角色 数据角色 access control RBAC role group functional role behavioral role data role
  • 相关文献

参考文献5

二级参考文献26

  • 1Sandhu R S.Role-based Access Control Models.IEEE Computer,1996,29(2):38-47
  • 2Sandhu R S,Bhamidipati V.The ARBAC97 Model for Role-based Administration of Roles.TISSEC,1999,2(1):105-135
  • 3Sandhu R S,Bhamidipati V.The URA97 or Role-based User-role Assignment.Proceedings of IFIP WG 11.3 Workshop on Database Security,Lake Tahoe,California,1997-08:11-13
  • 4D Ferraio, J Cugini, R Kuhn. Role-Based Access Control ( RBAC ) :Features and Motivations [ C ]. New Orleans, LA : Proceedings of the 1 1 th Annum Computer Security Application Conference, 1995.12-14.
  • 5David F Ferraiolo, John F Barkley, D Richard Kuhn. A Role-Based Access Control Model and Reference Implementation Within a Corporate Intranet [ J ]. ACM Transactions on Information and System Security, 1999,2( 1 ) :34-43.
  • 6Sejong Oh, Seog Park. Task-Role-Based Access Control Model [ J].Information Systems, 2003,28 ( 6 ) :533 - 536.
  • 7Ferrraiolo D F, Barkley J F,Kuhn D R. A Role Based Access Conrtrol Model and Refernence Implementation Within a Corporate Intranet [J]. ACM Transactions on Information Systems Security, 1999, (2).
  • 8.[EB/OL].http :∥www-900. ihm. com/developerWorks/cn/security/syscontrol/index. shtml[EB/OL],.
  • 9Gladney H.M., Meyers J.J., Worley E.L. Access control mechanism for computing resources. IBM Systems Journal, 1975, 14(3): 212~228
  • 10Anderson J.P. Computer security technology planning study. Air Force Electronic Systems Division, Hanscom AFB, Bedford, MA: Technical Report ESDTR-73-51, 1972

共引文献110

同被引文献24

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部