期刊文献+

基于角色的访问控制技术的用户权限管理及实现 被引量:9

下载PDF
导出
摘要 本文通过将基于角色的访问控制模型RBAC与传统的访问控制策略相比较,详细描述了基于角色的访问控制模型在角色分配和授权管理上良好的灵活性,同时将RBAC用于某企业的信息系统的设计中,以建立企业的安全访问控制策略。
作者 吴薇
出处 《福建电脑》 2008年第11期176-177,共2页 Journal of Fujian Computer
  • 相关文献

参考文献4

二级参考文献22

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2ITU-T Recommendation X.812. Security Frameworks for open Systems: Access Control Framework.
  • 3Sandhu R, Coyne E J. Role-based Access Control Models.IEEE Computer, 1996 (2).
  • 4Sandhu R. Role-based Access Control laboratory for Information Security Technology. ISSE Department, MS4A4,George Mason University, 1997.
  • 5Sandhu R, Bhamidipati V. The ARBAC97 Model for Role-based Administration of Roles: Preliminary Description and Outline. In Proceedings of the 2th ACM Workshop on Role-based Access Control, ACM,1997.
  • 6Ferraiolo D F,Barkley J F,Kuhn D R.A Role Based Access Control Model and Reference Implementation Within a Corporate Intranet ACM Transactions on Information Systems Security, 1999-02
  • 7Gavrila S I, Barkley J F. Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management. Third ACM Workshop on Role-based Access Control, 1998
  • 8Sandhu R, Coyne E J,Feinstein H L,et al. Role-based Access Control Models. IEEE Computer, 1996,29(2)
  • 9Ferraiolo D,Kuhn R.Role-based access controls[A].15th NIST-NCSC National Computer Security Conference[C].1992.554-563.
  • 10Sandhu R S,Coyne E J,Feinstein H L,Youman C E.Role -based access control Models[J].IEEE Computer,1996,29(2):38-47.

共引文献71

同被引文献50

引证文献9

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部