期刊文献+

RBAC访问控制模型的会话优先级扩展 被引量:3

SESSION PRIORITY EXTENSION FOR ROLE-BASED ACCESS CONTROL MODEL
下载PDF
导出
摘要 基于角色的访问控制模型近年来得到了广泛的重视与发展,提出了一个引入会话优先级概念的访问控制模型。同时给出了会话优先级的算法以及相应的会话调度策略。极大地提高了系统的控制能力并满足了不同身份用户的访问需求。 Role-based Access Control (RBAC) model is greatly emphasized and developed in recent years. We put forward an RBAC model with session priority. A session priority algorithm and a correlative session scheduling policy are developed at the same time. The control ability of this system is greatly improved and the access needs of users with different identifications are satisfied.
作者 刘佳 刘洪冰
出处 《计算机应用与软件》 CSCD 北大核心 2008年第10期30-31,37,共3页 Computer Applications and Software
基金 国家自然科学基金项目(90104035)
关键词 访问控制 会话 优先级 调度策略 Access control Session Priority Scheduling policy
  • 相关文献

参考文献5

  • 1Ravi S Sandhu, Edward J Coyne, Hal L Feinstein, et al. Role-based access control models [ J ]. IEEE Computer, 1996,29 ( 2 ) : 38 - 47.
  • 2Sandhu R S, Samarati P. Access Control : Principles and Practice [ J ]. IEEE Communications, 1994,32 (9) : 40 - 48.
  • 3Ravi S Sandhu, Venkata Bhamidipati, Qamar Munawer. The ARBAC97 model for Role-based administration of Roles[ J]. ACM Transactions on Information and System Security, 1999,2 (1) : 105 -135.
  • 4Sejong Oh, Ravi S Sandhu. A model for role administration using organization structure [ A ]. SACMAT,2002 : 155 - 162.
  • 5王瑜,卿斯汉.一种新的访问控制模型——TBPM-RBAC[J].计算机科学,2005,32(2):169-172. 被引量:7

二级参考文献7

  • 1Ferraiolo D F, et al. Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and System Security,2001,4(3): 224~274.?A
  • 2Sandhu R S,Samarati P. Access Control:Principles and Practice.IEEE Comrnunications, 1994,32 (9):40 ~ 48.
  • 3Sandhu R S, Coyne E J,Feinstein H L, Youman C E. Role-Based Access Control Models. IEEE Computer,1996,29(2):38~47.
  • 4Thomas R K, Sandhu R S. Task-based Authorization Controls (TBAC) :A Family of Models for Active and Enterprise-oriented Authorization Management. In:Proc. of the IFIP WG11.3 Workshop on Database Security. Lake Tahoe, California: Chapman &Hall,1998. 166~181.
  • 5Thomas R K,Sandhu R S. Conceptual Foundations for a Model of Task-based Authorizations. In: Proc. of the 7th IEEE Computer Security Foundations Workshop. Franconia,NH:IEEE Computer Society Press,1994. 66~79.
  • 6Coulouris G,Dollimore J,Roberts M. Role and Task-Based Access Control in the PerDiS Groupware Platform. In: Proc. of the Third ACM Workshop on Role-Based Access Control. New York, USA:ACM Press ,1998. 115~121.
  • 7Jonscher D. Extending Access Control with Duties-Realized by Active Mechanisms. Database Security,VI: Status and Prospects.Amsterdam, The Netherlands :North-Holland, 1993.91~111?A.

共引文献6

同被引文献11

引证文献3

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部