期刊文献+

面向信息安全的域间角色访问控制模型的改进

Improvement of inter-domain role-based access control model for information security
下载PDF
导出
摘要 基于传统的IRBAC2000模型,对域间角色转换时产生的安全问题进行了分析。提出了一种改进的IRBAC2000模型,该模型将传统模型中的角色分为域内角色和域间管理员角色,为域间角色转换产生的安全性问题提供了一种新的判定方法,提出了先决条件的概念来加强IRBAC2000模型安全性的保护机制。 Based on traditional IRBC2000 models, the secure issue caused in inter-domain role transformation was analyzed. An improved IRBAC2000 model was presented ,which divided the roles in the traditional model into two types: inside-domain role and inter-domain role; provided a judgment method for the secure issue caused in inter-domain roles transformation and introduced a prerequisite to strengthen the protective mechanism of the security of IRBC2000 model.
出处 《自然灾害学报》 CSCD 北大核心 2008年第6期26-29,共4页 Journal of Natural Disasters
基金 国家高技术研究发展计划(863计划)项目(2006AA01Z455 2006AA120102)
关键词 访问控制模型 角色转换 角色继承 信息安全 access control model role-transform role-heritage information security
  • 引文网络
  • 相关文献

参考文献8

  • 1OSBON S, SANDHU R. Configuring role-based access control to enforce mandatory and discretionary access control policies[ J]. ACM Transactions on Information and System Security, 2000, 3(2) :85 -106.
  • 2ELISA BERTINO A Temporal Access Control Mechanism for Database Systems[ J ]. IEEE Transactions on knowledge and data engineering, 1996, 8( 1 ) :222 -232.
  • 3JOSHI J B D. A Generalized Temporal Role Based Access Control Model for Developing Secure system[ D]. West Lafayette: Purdue University, 2003.
  • 4APU KAPADIA, JALAL AL-MUHTADI, R CAMBELL,et al. IRBAC 2000: Secure interoperability using dynamic role translation[ R]. University of Illinois, Technical Report : UIUCDCS-R-2000 - 2162, 2000.
  • 5SANDHU R, COYNE E, Feinstein H, et al. Role-Based Access Control Model[J]. IEEE Computer, 1996, 29(2) : 8 -47.
  • 6余文森,张正球,章志明,余敏.基于角色的访问控制模型中私有权限问题的研究[J].计算机应用研究,2004,21(4):50-51. 被引量:18
  • 7OH S, PARK S, Task-role-based access control model[ J]. In formation Systems, 2003, 28 (6) : 533 -562.
  • 8董光宇,卿斯汉,刘克龙.带时间特性的角色授权约束[J].软件学报,2002,13(8):1521-1527. 被引量:51

二级参考文献9

  • 1[1]Sandhu, R. Issues in RBAC . In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 21~24.
  • 2[2]Jaeger, T. On the increasing importance of constraints. In: Proceedings of 4th ACM Workshop on Role-Based Access Control. Fairefax, VA: ACM Press, 1999. 33~42.
  • 3[3]Ahn, G.-J. The RCL2000 language for specifying role-based authorization constraints [Ph.D. Thesis]. Fairfax, VA: George Mason University, 1999.
  • 4[4]Sandhu, R., Coyne, E.J., Feinstein, H.L., et al. Role-Based access control models. IEEE Computer, 1995,29(2):38~47.
  • 5[5]Chen, Fang, Sandhu, R. Constraints for role-based access control. In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 39~46.
  • 6刘琼波.[D].上海:上海交通大学计算机科学与工程系,.
  • 7Ravi S Sandhu, et al. Role-based Access Control Models [ J ]. IEEE Computer, 1996,29(2 ) :8-47.
  • 8Matunda Nyanchama,Sylvia Osbom. Access Rights Administration in Role- based Security System [ A ] IN: J Biskup, M Morgenstem C E Landwehr. Database Security Ⅷ : Status & Prospects [ C ]. North- Holland : Elsevier, 1994.37- 56.
  • 9林磊,骆建彬,邓宪,宋志刚.管理信息系统中基于角色的权限控制[J].计算机应用研究,2002,19(6):82-84. 被引量:69

共引文献67

相关主题

;
使用帮助 返回顶部