期刊文献+

基于角色的轻量级多粒度访问控制框架研究 被引量:1

Research of Lightweight and Multi-Granularity for Access Control Framework Based on Role
下载PDF
导出
摘要 以基于角色的访问控制为理论依据,提出了一种轻量级的通用访问控制框架,应用.Net平台的代码访问安全及对象关系映射技术实现了Web页面及Web服务资源的访问控制,以及不同层次的访问控制粒度,并将该框架应用于某市软件信息网的开发. Based on the theory of role-based access control, a common lightweight access control framework is proposed in this paper. The framework adopts . Net platform code access security and object relation mapping to realize access control to web page, Web services and different access control granularity, and it has been applied in a city software information network development.
出处 《微电子学与计算机》 CSCD 北大核心 2008年第7期87-91,共5页 Microelectronics & Computer
基金 陕西省科技计划项目(2006k05-G10) 陕西省教育厅科技计划项目(07JK333) 西安市信息技术专项(ZX06030) 西安市科技局应用发展研究项目(YF07022)
关键词 基于角色的访问控制 代码访问安全 对象关系映射 软件框架 role-based access control code access security object relation mapping software framework
  • 相关文献

参考文献5

二级参考文献20

  • 1[1]Anderson J P.Computer Security Technology Planning Study. ESD-TR -73-51, Vol. 1 and 2, Hanscom AFB, Mass., 1972 (also available as DTICAD-758206)
  • 2[2]Ames S R, Gasser J M, Schell R R. Security Kernel Design and Implementation:An Introduction, Com puter, 1983,6(7): 14-22
  • 3[3]Dept. of Defense Standard. Department of Defense Trusted Computer System Evaluation Criteria. DOD 5200.28-STD, GPO 1986-623-963,643 0, 1985-12-26
  • 4[4]Lampson B W. Dynamic Protection Structures. In Proceedings of the AFIPS Fall Joint Computer Conference, Volume 35, Las Vegas,Nevada, 1969-11:27-38
  • 5[5]Lampson B W. Protection. Proc. Fifth Princeton Symp. Information Sciences and Systems, Princeton Univ., Princeton, N.J.,1971-03: 437-443, Reprinted in Operating System Rev., 1974,8(1 ): 18-24
  • 6L Snyder. Formal Models of Capability-based Protection Systems[ J].IEEE Transactions on Computers, 1981,30(3 ) :172-181.
  • 7R Sandhu, E Coyne, H Feinstein. Role-based Access Control Models[ J]. IEEE Computer, 1996,29 (6) :38-47.
  • 8D Ferraiolo, R Sandhu,et al. Proposed NIST Standard for Role-based Access Control [ J ]. ACM Transactions on Information and System Security(TISSEC) ,2001,4(3) :224-274.
  • 9R Thomas, R Sandhu. Task-Based Authorization Controls(TBAC) : A Family of Models for Active and Enterprise-Oriented Authorization Management[ C]. Lake Tahoe, CA: Proceedings of the 11th IFIP WG11.3 Conference on Database Security, 1997.
  • 10Gail-Joon Ahn, Myong Kang,et al. Injecting RBAC to Secure a Webbased Workflow System[ C]. ACM RBAC, 2000.

共引文献119

同被引文献6

  • 1吴毓毅,贺也平.关于网格计算授权机制的研究[J].计算机应用研究,2005,22(8):81-83. 被引量:6
  • 2Pearlman L, Kesselman C, Welch V, et al. The community authorization service: status and future [ C]//Proc. of Int'l Conference for Computing in High Energy and Nuclear Physics. USA: La Jolla, 2003.
  • 3Sandhu R, Coyne E, Feinstein H, et al. Role- based access control models [ J ]. IEEE Computer, 1996, 29 (2) : 38 - 47.
  • 4Thomas R K, Sandhu R. Task- based authorization controis: a family of models for active and enterprise - oriented authorization management[C]//Proceedings of the 11th IFIP WG11.3 on Database Security. Canada, Vancouver, 1997: 166- 181.
  • 5张亚红,王勇,陈辉.网格环境下基于角色和任务的访问控制模型设计与研究[J].微电子学与计算机,2008,25(5):179-181. 被引量:2
  • 6毛碧波,孙玉芳.角色访问控制[J].计算机科学,2003,30(1):121-123. 被引量:37

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部