期刊文献+

TRBAC模型的研究及其在企业MIS中的应用 被引量:4

Research of TRBAC model and its application in enterprise MIS
下载PDF
导出
摘要 访问控制是保证企业信息系统安全性的重要组成部分,但传统的模型都不能满足企业多变的控制需求,因此引出了基于任务-角色的访问控制模型(TRBAC)来满足企业的需求。该模型解决了基于角色的访问控制模型(RBAC)不够灵活的缺点,并通过时间约束、最小特权约束和职责分离约束增加了系统的安全性。最后结合实例,详细阐述了TRBAC模型在企业权限管理中的实现。 Access control is an important part of the information system security in the enterprise environment, but the conventional models can't fully meet the changeful requirements of the enterprise environment, therefore task-role-based access control model (TRBAC) is introduced to satisfy the enterprise requirements. This model improved the flexibility of role-based access control model (RBAC), and enhances the security of the system by time restriction, minimal privilege restriction and responsibility separation restriction. And then the realization of TRBAC model is elaborated in enterprise privilege management for example.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第12期3106-3108,共3页 Computer Engineering and Design
关键词 TRBAC 企业环境 工作流 授权约束 MIS TRBAC enterprise environment workflow authorization restriction MIS
  • 相关文献

参考文献8

二级参考文献46

  • 1程玉松,孟丽荣,盛琦,刘学波,柳楠.利用规则RBAC模型实现门户的安全访问控制[J].计算机工程与设计,2005,26(5):1299-1301. 被引量:11
  • 2李卿,乔元松,郑慧.角色分离的层次化RBAC模型[J].计算机工程与设计,2005,26(6):1563-1565. 被引量:7
  • 3李帆,郑纬民.基于角色与组织的访问控制模型[J].计算机工程与设计,2005,26(8):2136-2140. 被引量:27
  • 4邓集波 洪帆.基于任务的授权模型.软件学报,2003,14(1):76~82.http://www.jos.org.cn/1000-9825/14/76.htm.,.
  • 51,D. Ferraiolo, J. Cugini, and D.R.Kuhn. Role Based Access Control: Features and Motivations. In Annual Computer Security Applications Conference. IEEE Computer Society Press, 1995
  • 62,D. Richard Kuhn. Mutual Exclusion of Roles As a Means of Implementing Separation of Duty in Role-Based Access Control Systems National Institute of Standards and Technology. Gaithersburg, Maryland 20899
  • 73,E. B. Fernandez and J. C. Hawkins. Determing Role Rights from Use Cases. ACM97
  • 84,J. F. Berkley. Comparing Simple Role Based Access Control Models and Access Control Lists. NIST. Gaithersburg, MD 1997
  • 95,Observations on the Real-World Implementation of Role-Based Access Control. http://www.schumannsoftware.com/.
  • 10Fcrraiolo DF, Sandhu R, Guirila S, Kuhn DR, Chandramouli R. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 2001,4(3):224-274.

共引文献379

同被引文献29

引证文献4

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部