期刊文献+

基于时间角色访问控制授权模型的研究 被引量:2

Research on Authorization Model Based on Time RBAC
下载PDF
导出
摘要 基于角色的访问控制作为一种新型的访问控制技术成为近年来访问控制领域研究的热点,但目前主要工作均立足于与时间特性无关的其他方面。在基于角色访问控制的几种主要模型的基础上,提出了一种基于时间的角色访问控制模型。引入时间的目的是使系统更加安全有效。充分体现了TRBAC模型更能满足信息安全管理的需求,使扩展的TR-BAC模型更能适应系统的需求。 As a new access control technology, role-based access control has been very popular in that research field in recent years, but the main work focus on some other characters which has nothing to do with the time character. Synthesizes main models of role- based aceros control and designs a time role - based access control model which is called TRBAC model. Introducing time is to make the system more safe and effective. TRBAC can meet the needs of information security and satisfy the systems better.
出处 《计算机技术与发展》 2008年第11期138-141,共4页 Computer Technology and Development
基金 博士后基金资助项目(20070410381) 安徽省自然科学研究项目(KJ2008B116) 池州学院自然科学研究项目(XK0714)
关键词 访问控制 角色 时间 倒RBAC access control role time TRBAC
  • 相关文献

参考文献10

  • 1Sandhu R S, Coyne E J, Feinstein H L,et al. Role - Based Access Control Models[ J ]. IEEE Computer, 1996,29 (2) : 38 - 47.
  • 2Sandhu R S, Bhamidipati V, Munawer Q. Role - Based administration of User - Role Assignment: The URA97 Model and Its Oracle Implementation [J]. The Journal of Computer Security, 1999,2 : 105 - 130.
  • 3Sejong O,Sandhu R. A Model for Role Administration using Organization Structure [ C]//Proc. 7th ACM Symposium on Access Control Models and Tectmologies. Monterey, Calif. : [s. n. ] ,2002 : 155 - 162.
  • 4乔颖,须德,戴国忠.一种基于角色访问控制(RBAC)的新模型及其实现机制[J].计算机研究与发展,2000,37(1):37-44. 被引量:75
  • 5Hayton R J, Bacon J M, Moody K. OASIS: Access Control in an Open, Distributed Environment [ C]//In Proceedings of IEEE Symposium on Security and Privacy. Oakland,CA: [s. n. ],1998:3- 14.
  • 6Hine J, Yao W, Bacon J, et al. Architecture for distributed OASIS services[ C]//Proe. Middleware 2000, Lecture Notes in Computer Science. New York: Springer - Verlag, 2000 : 107 - 123.
  • 7Elisa B, Andrea B P, Elena F. TRBAC: A Temporal Role - Based Access Control Model[J ]. ACM Transactions on Informarion and Systems Decurity,2000,4(3):21 -30.
  • 8黄建,卿斯汉,温红子.带时间特性的角色访问控制[J].软件学报,2003,14(11):1944-1954. 被引量:73
  • 9Elisa B, Claudio B, Elena F, et al. Atemporal access control mechanism for database systems[J]. IEEE Trans on Knowledge and Data Engineering, 1996,8 ( 1 ) : 67 - 80.
  • 10Ferraiolo D F, Kuhn D R, Chandramouli R. Role - Based Access Control[M]. London: Artech House, 2003.

二级参考文献11

  • 1Ferraiolo DF, Sandhu R, Gavrila S. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 2001,4(3):224-274.
  • 2Osbom S, Sandhu R. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, 2000,3(2):85-106.
  • 3AHN G-J, Sandhu R. Role-Based authorization constraints specification. ACM Transactions on Information and System Security, 2000,3(4):207-226.
  • 4Sandhu R. Issues in RBAC. In: Youman C, Sandhu R, Coyne E, eds. Proceedings of the 1st ACM Workshop on Role-based access control. ACM Press, 1996. 21-24.
  • 5Ferraiolo D, Kuhn R. Role based access control. In: Proceedings of the 15th National Computer Security Conference, National Institute of Standards and National Computer Security Center. 1992. 641-650.
  • 6董光宇 卿斯汉 刘克龙.带时间特性的角色授权约束.软件学报,2002,13(8):1521~1527[EB/OL].http://www.jos.org.cn/1000-9825/13/1521.pdf.,.
  • 7Chang C C,Inform Sci,1997年,96卷,1-2期,15页
  • 8Hw ang M S,Computers Security,1996年,15卷,1期,73页
  • 9Hw ang M S,IEICE Trans Inf Syst,1994年,77卷,9期,1042页
  • 10Hwang J J,Computer J,1992年,35卷,1期,16页

共引文献145

同被引文献13

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部