期刊文献+

一种新的基于角色的访问控制模型 被引量:1

A new model of role-based access control
下载PDF
导出
摘要 文章提出了一种新的基于RBAC的角色层次控制与用户业务限制混合权限管理模型(N-RBAC),定义了角色的共有权限、基于层次控制的角色影子权限以及用户的私有业务约束;该模型比传统的RBAC或其修正模型具有更高的灵活性和更广的适用性,解决了角色与用户之间共性与个性的矛盾,既简化了信息系统中对用户授权管理,又使相同角色的用户对相同的功能模块可以有不同的操作限制;详细讨论了N-RBAC的设计原理与实现方法;应用实践表明该模型使用方便,设置灵活,能有效满足各类信息系统权限管理的需要。 A new authoritative management model, N-RBAC, which is based on the combination of role hierarchy control with the user transaction limit is presented. The public authority of the role, the shadow authority based on the role hierarchy control, and the user's private transaction restraint are defined. Compared with the traditional RBAC or its revised model, the N-RBAC is more flexible and efficient, the contradiction of generality and individuality between the role and the user is resolved. It not noly simplifies the user authorization management in the information system, but it also enables those users with the same role to have the different operating limitation to the same function module. The detailed discussions are given about the principle of design and the implementation method of the N-RBAC. It is proved in application practice that the proposed model is easy in operation and flexible in establishment.
出处 《合肥工业大学学报(自然科学版)》 CAS CSCD 北大核心 2008年第11期1782-1785,1804,共5页 Journal of Hefei University of Technology:Natural Science
基金 国家科技创新基金资助项目(05C26222120349) 安徽省教育厅自然科学基金资助项目(kj2007a124zc)
关键词 信息系统 权限管理 角色 基于角色的访问控制 层次控制 information system authority management role role-based access control(RBAC) hierarchy control
  • 相关文献

参考文献8

二级参考文献45

  • 1马林胜.[D].北京:北京航空航天大学机械工程及自动化学院,2002.
  • 21,Ferraiolo D F, Kuhn R. Role-Based access control. In: Proceedings of the 15th National Computer Security Conference. Baltimore, MD, 1992. 554~563, http://hissa.ncsl.nist.gov/kuhn/
  • 32,Sandhu R, Samarati P. Access control: principles and practice. IEEE Communications, 1994,32(9):40~48
  • 43,Ramaswamy C, Sandhu R. Role-Based access control features in commercial database management systems. In: Proceedings of the 21st National Information Systems Security Conference. Virginia: U.S. Government Printing Office, 1998, http://www.list.gmu.edu/conferen.htm
  • 54,Sandhu R, Coyne E J, Feinstein H L et al. Role-Based access control models. IEEE Computers, 1996,29(2):38~47
  • 65 Sandhu R. Rationale for the RBAC96 family of access control models. In: Proceedings of the 1st ACM Workshop on Role-Based Access Control. ACM, 1997. http://www.list.gmu.edu/conferen.htm
  • 7Kim K H. Boolean matrim theory and applications[M]. USD:Dekker, Marcel Incorporated, 1982.
  • 8Sanhu R S, Coyne E J, Feinstein H L, et al. Role-base access models[J]. EIII Computer, 1996,29(2).
  • 9Ahn G J, Arvisandhu. Role-based authorization constraints specification[ J]. ACM Transcations on Information and System Security,2002,3:207 - 226.
  • 10David F. Ferraiolo, John F. Barkley, and D. Richard Kuhn. A role based access control model and reference implementation within a corporate intranet[ J] .ACM Ttansactions on lnformtion Systems Security, February 1999,2(1) :34- 64.

共引文献207

同被引文献9

引证文献1

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部