期刊文献+

RBAC模型的非法信息流控制

Illegal Information Flow Control on RBAC Model
下载PDF
导出
摘要 由于缺乏信息流控制机制,RBAC模型的授权访问可能导致不安全的信息流.为了保护RBAC模型系统中信息的机密性,定义了RBAC模型的非法信息流概念,给出了非法信息流的检测、更新以及控制算法。将这些算法用于RBAC模型的授权管理可有效防止信息的非授权泄漏,实现安全的访问。 Due to lock the mechanism of controlling information flow, the authorized accesses of RBAC model may lead to insecure information flow. To protect confidentiality of information in RBAC model systems, the concept of illegal information flow is defined, algorithms of detecting, renewing and controlling illegal information flow are proposed. These algorithms can prevent effectively unauthorized information leakage, realize secure aceesses.
出处 《计算机科学》 CSCD 北大核心 2008年第8期65-68,89,共5页 Computer Science
基金 国家"863"高技术研究发展计划基金项目(2005AA147050)
关键词 RBAC 非法信息流 引发用户 威胁用户 RBAC, Illegal information flow, Users of inducing, Users of threatening
  • 相关文献

参考文献6

  • 1Sandhu R, Coyne E, Feinstein H et al. Role-based access control model [J]. IEEE comprter, 1996,29(2):38-47.
  • 2Ferraiolo D F, Sandhu R S, Gavrila S, et al. Proposed NIST standardfor role-based access control [J]. ACM transactions on information and system security, 2001,3 (4) : 182-186.
  • 3Al kahtani M, Sandhu R. Induced role hierarchies with attributebased RBAC [C] // proceedings of the 8^th ACM symposium on access control models and technologies. Villa Gallia, 2003: 142- 148.
  • 4Bell D E, LaPadula L J. Secure computer system: Unified eposition and MUL TICS interpretation. The MITRE Corporation, Technical Report: MTR-2997 Revisionl. 1976.
  • 5李斓,冯登国,徐震.RBAC与MAC在多级关系数据库中的综合模型[J].电子学报,2004,32(10):1635-1639. 被引量:13
  • 6Izaki k, Tanaka K, Tskizawa M. Information flow control in role-based model for distributed objects// Proc of the 8^th Int' l Conf. on Parallel and Distributed Systems. Los Alamitos, CA:IEEE Computer Society Press,2001:363-370.

二级参考文献9

  • 1D Elliott Bell,Leonard J LaPadula.Bell-LaPadula Model For Secure Computer Systems[R].The MITRE Corporation,March 1976.
  • 2D F Ferraiolo,D R Kuhn.Role-based access control[A].In Proc.of 15th National Computer Security Conference[C].October,1992.554-563.
  • 3Nyanchama M,Osborn S L.Information flow analysis in role-based security system[J].Journal of Computing and Information,1994,1(1):1368-1384.
  • 4Ravi Sandhu,Edward J.Coyne,Hal L.Feinstein,Charles E.Youman.Role-based access control models[J].IEEE Computer,February 1996,29(2):38-47.
  • 5D Ferraiolo,R Sandhu,S Gavrila,D Kuhn,R Chandramouli.Proposed NIST standard for role-based access control[A].ACM TISSEC[C].Volume 4,Issue 3,August 2001,4(3):224-274.
  • 6S Osborn,R Sandhu,Q Munawer.Configuring role-based access control to enforce mandatory and discretionary access control policies[A].ACM TISSEC[C].Volume 3,Issue 2,May 2000.85-106.
  • 7D Richard Kuhn.Role based access control on MLS systems without kernel changes[A].In Proc.of the third ACM Workshop on Role-Based Access Control[C].Fairfax,Virginia,United States,October 22-23,1998.25-32.
  • 8Sylvia Osborn.Mandatory access control and role-based access control revisited[A].In Proc.of the Second ACM Workshop on Role-Based Access Control[C].Fairfax,Virginia,United States,November 06-07,1997.31-40.
  • 9Ravi Sandhu.Design and implementation of multilevel databases[A].In Proc.of 6th RADC Workshop on Multilevel Database Security[C].Southwest Harbor,Maine,June 1994.

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部