期刊文献+

面向多客体的细粒度RBAC模型及应用 被引量:5

Multi-object Oriented Fine Grain RBAC Model and Its Application
下载PDF
导出
摘要 从综合信息管理系统以及软件系统集成的需求出发,分析了NIST RBAC模型的局限性,在此基础上对其模型进行扩充,提出ERBAC模型。该模型适用于多种客体且具体客体不确定的情况。文章还给出了ERBAC模型的具体定义和应用实例。 This paper analyses the requirements of comprehensive information management system and software integration. It proposes an extended model named ERBAC, which is based on the analysis of the shortcomings of NIST RBAC model. The extended model is applicable to the case of having multiple and unknown objects. And the definition and an instance of the ERBAC model are described.
作者 孔芳 朱巧明
出处 《计算机工程》 CAS CSCD 北大核心 2008年第11期29-31,34,共4页 Computer Engineering
基金 国家“863”计划基金资助项目(2006AA01Z147) 国家自然科学基金资助项目(60673041)
关键词 细粒度 多客体 访问控制 综合信息系统 fine grain multi-object access control comprehensive information management system
  • 相关文献

参考文献6

  • 1Sandhu R S, Coyne E, Feinstein H, et al. Role-based Access Control Models[J]. IEEE Computer, 1996, 29(2): 38-47.
  • 2Sandhu R S, Bhamidipati V, Coyne E, et al. The ARBAC97 Model for Role-based Administration of Roles: Preliminary Description and Outline[C]//Proc. of the 2nd ACM Workshop on Role-based Access Control. New York, USA: ACM Press, 1997: 41-50.
  • 3Ferraiolo D F, Sandhu R S, Gavrile S, et al. Proposed NIST Standard for Role-based Access Control[J]. ACM Transactions on Information and Systems Security, 2001, 4(3): 224-274.
  • 4Zhu Qiaoming, Li Peifeng, Zhang Su, et al. A Unified Authorization Platform Based on RBAC4WAS Model for Web Application System Integration[C]//Proc. of International Conference on Cyberworlds. [S.l.]: IEEE Computer Society, 2005: 505-509.
  • 5甘泉,贺也平,韩乃平.一种改进的基于角色的访问控制[J].计算机工程,2006,32(7):140-142. 被引量:8
  • 6郭慧,李阳明,王丽芬.基于角色和任务的访问控制模型的设计与研究[J].计算机工程,2006,32(16):143-145. 被引量:14

二级参考文献10

  • 1张永勇,陈福民.网络计算的OGSA应用模型[J].微型电脑应用,2004,20(8):52-53. 被引量:2
  • 2Sandhu R S,Coyne E,FeiMtein H L,et al.Role-based Access Control Models[J].IEEE Computer,1996,29(2):38-47.
  • 3Sandhu R S,Ferraiolo D,Kuhn R.The NIST Model for Role-based Access Control:Towards a Unified Standard[C].Proceedings of the Fifth ACM Workshop on Role Based Access Control,Berlin,Germany:ACM,2000:47-63.
  • 4Kern A.Advanced Features for Enterprise-wide Role-based Access Control[C].18^th Annual Computer Security Applications Conference,2002:333-342.
  • 5Kern A,Schaad A,Moffett J D.An Administration Concept for the Enterprise Role-based Access Control Model[C].8^th ACM Symposium on Access Control Models and Technologies,2003:3-11.
  • 6Kern A,Kuhlmann M,Schaad A,et al.Observations on the Role Life-cycle in the Context of Enterprise Security Management[C].7^th ACM Symposium on Access Control Models and Technologies,2002:43-51.
  • 7Al-Kahtani M A,Sandhu R S.A Model for Attribute-based User-role Assignment[C].18^th Annual Computer Security Applications Conference,2002:353-364.
  • 8Foster I, Kesslman C, Tuecke S. The Anatomy of the Grid :Enabling Scalable Virtual Organizations[J]. Journal of Supercomputer Applications, 2001, 15(3): 1-10.
  • 9Kandala S, Sandhu R. Secure Role-based Workflow Models[C].Proceedings of the Fifteenth Annual Working Coaference on Data Base and Application Security, 2002: 45-58.
  • 10陈丽侠,陈刚,董金祥.基于任务的工作流访问控制模型和实现框架[J].计算机应用研究,2003,20(9):42-44. 被引量:12

共引文献20

同被引文献24

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部