期刊文献+

信息系统中基于角色的权限控制模型研究与应用 被引量:10

RESEARCH AND APPLICATION OF ROLE-BASED ACCESS CONTROL IN INFORMATION SYSTEM
下载PDF
导出
摘要 基于RBAC的访问控制模型能有效弥补DAC和MAC的不足,而多数信息系统要求用户权限必须灵活控制、统一管理、可维护。据此提出改进的RBAC控制模型,即将全部数据资源以业务功能模块表示,并授予各预设的角色,用户临时需要的权限则直接授予或撤销。该改进方法已经在实际项目中得到了应用。 Role-Based Access Control (RBAC) model can make up the insufficiencies of DAC (discretional access control) and MAC ( mandatory access control), whereas most information systems seek the user's privilege must be flexible control, uniform manage and maintainable. A new betterment model for RBAC is presented based on the analysis of the speciality access control in information system. All data resource are expressed by operation function modules, and privileges are awarded to roles which are setup beforehand, user's temporary privilege can be granted or revoked. The improved model has been applied in a project.
出处 《计算机应用与软件》 CSCD 北大核心 2008年第12期284-285,共2页 Computer Applications and Software
基金 军事后勤科研计划课题(需040126)
关键词 信息系统 访问控制 角色 权限 Information system Access control Role Privilege
  • 相关文献

参考文献4

二级参考文献28

  • 1王超,茅兵,谢立.一种四维访问矩阵模型的建立[J].计算机工程与设计,2004,25(5):668-670. 被引量:2
  • 2邢光林,洪帆.基于角色和任务的工作流访问控制模型[J].计算机工程与应用,2005,41(2):210-213. 被引量:42
  • 3李红卫.一种扩展角色存取控制模型[J].榆林高等专科学校学报,2002,12(2):18-20. 被引量:1
  • 4Marsh S. Formalising Trust as a Computational Concept:[Ph. D. Thesis]. University of Stirling, 1994
  • 5Aberer K, Despotovic Z. Managing Trust in a Peer-2-Peer Information System. In: Proc. of the Tenth Intl. Conf. on Information and Knowledge Management (ACM CIKM'01), 2001. 310~317
  • 6Xiong L, Liu L. A Reputation-Based Trust Model for Peer-to-Peer Ecommerce communities. In:IEEE Conference on E-Com-merce (CEC'03) 2003
  • 7Seigneur J-M, Jensen C. The Role of Identity in Computational Trust. In: Proc. of The First Workshop on Security and Privacy at the Conf. on Pervasive Computing, Vienna, Austria, April 2004
  • 8English C, Terzis S, Wagealla W. Engineering Trust Based Collaborations in a Global Computing Environment. In: Proc. of the Second Intl. Conf. on Trust Management (iTrust 2004), LNCS,Springer-Verlag, 2004
  • 9Gray E, O'Connell P, Jensen C, et al. Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications: [Technical Report TCD-CS-2002-66]. Department of Computer Science, Trinity College Dublin, December 2002
  • 10Park J S,Hwang J. Role-Based Access Control for Collaborative Enterprise in Peer-to-Peer Computing Environment. In: 8th ACM Symposium on Access Control Models and Technologies (SACMAT), Como, Italy, June 2-3, 2003

共引文献92

同被引文献69

引证文献10

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部