期刊文献+

协同企业建模中的动态访问控制方法 被引量:1

Dynamic Access Control Method in Collaborative Enterprise Modeling
下载PDF
导出
摘要 为了保证在网络化的协同企业建模系统中对模型的安全访问,需要建立一套有效的访问控制机制。在分析基于角色的访问控制、自主型的访问控制及强制型访问控制的基础上,结合协同企业建模系统的特点,提出在模型节点状态约束下,基于角色和任务的动态访问控制方法。该方法确定用户在建模工作中的岗位、该岗位负责的任务和充当的角色,考察任务中对应的模型节点状态及确定访问权限,利于实现用户与受控对象的细粒度的访问控制。给出了系统的实现方法。 To guarantee access security in network collaborative enterprise modeling systems, establishing access control function is in demand. Based on study of the role-based access control, discretionary access control and mandatory access control, combined with the characteristic of the collaborative enterprise modeling .system, a role and task based dynamic access control with limitation of the enterprise model node state is proposed. In this method, user's position, the tasks performed by this position and the role are confirmed, the corresponding model node status are examined. And the access authorization is established. These are convenient for realizing the grained security administration to users and objects. Based on the specification, system realization method is presented.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第17期178-179,182,共3页 Computer Engineering
基金 国家"973"计划基金资助项目(2003AA413210)
关键词 访问控制 协同企业建模 角色 模型状态 access control collaborative enterprise modeling role model state
  • 相关文献

参考文献5

二级参考文献21

  • 1张永勇,陈福民.网络计算的OGSA应用模型[J].微型电脑应用,2004,20(8):52-53. 被引量:2
  • 2WfMC. TC00-1019:Workflow Management Coalition Workflow Security Considerations White Paper[S]. http://www. wfmc.org, 1998.
  • 3Miller J A, etal. Security in Web-based Workflow Management Systems[C].ACM Trans. on Information and System Security, 2002.
  • 4Sandhu RS, Coyne E J, Feinstein H L, Youman C E. Role Based Access Control Models[J]. In IEEE Comnputer, 1996,29(2):38-47.
  • 5Kandala S, Sandhu R. Secure Role-based Workflow Models[J]. In Proceedings of the 15th IFIP WG 11.3 Wonking Conference on Database Security,Kluwer 2002: 45 - 58.
  • 6Kumar A, Kamik N, Chafle G. Context Sensitivity in Role-based Access Control[J]. ACM SIGOPS Operating Systems Review, July 2002.
  • 7SANDHU R. Future directions in role-based access control models[A]. MMM-ACNS[C]. Petersburg Russia: Springer-Verlag GmbH, 2001. 22-26.
  • 8American National Standards Institute. American national standard for information technology - role based access control[EB]. http://csrc. nist. gov/rbac/rbac- std- nist. pdf,2003-04.
  • 9SANDHU R, COYNE E, FEINSTEIN H, et al. Role-based access control models[J]. IEEE Computer, 1996, 29(2): 38-47.
  • 10MOYER M J, AHAMAD M. Generalized role-based access control[A]. Distributed Computing Systems[C]. California,CA, USA: IEEE Computer Society, 2001. 391-398.

共引文献59

同被引文献37

引证文献1

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部