期刊文献+

一种矩阵型组织模式下的访问控制模型

An Access Control Model under Matrix Organization
下载PDF
导出
摘要 基于矩阵型组织方式下的系统产生了很多新的安全访问控制方面的问题,RBAC虽然是很好的选择,但传统的RBAC96模型在组织结构管理和客体的交叉访问方面存在着一定的局限性。针对这两方面问题,对RBAC96模型进行了扩展和改进,提出了一种基于矩阵型组织机构和角色访问控制模型——MO-RBAC。该模型着重于组织结构的管理和客体的协同访问控制,使得模型一方面具有了很好的灵活性和易用性,另一方面,提高了系统的安全,防止了相关角色对客体的非法访问。 Systems based on matrix organization brought about many new issues about access control. Although role based access control is a perfect choice, there are some limitations in the traditional RBAC96 model about organization management and objects crossed accessing. Aim at these problems,puts forward a new improved access control model, the matrix organization and role based access control (MO - RBAC), whieh is based on the RBAC96 model. This model attaches importance on organization structure management and cooperative accessing control of objects, which on the one hand has very good flexibility and convenience, on the other hand, can avoid related roles' illegal access and unauthorized operation.
作者 张翼飞 徐蕾
出处 《计算机技术与发展》 2009年第4期180-183,共4页 Computer Technology and Development
基金 国家863子课题(2002AA142110)
关键词 矩阵型组织 RBAC 访问控制 客体 matrix organization role based access control access control object
  • 相关文献

参考文献6

二级参考文献19

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2季庆光,卿斯汉,贺也平.基于DTE技术的完整性保护形式模型[J].中国科学(E辑),2005,35(6):570-587. 被引量:4
  • 3Sandhu R S,Coyne E J,Feinstein H L,et al.Role-based Access Control Models[J].IEEE Computer,1996,29(2):38-47.
  • 4Ferraiolo D F,Barkley J F,Kuhn D R.A Role-based Access Control Model and Reference Implementation Within a Corporate Intranet[J].ACM Transaction of Information System Security,1999,2(1):34-64.
  • 5Kumar A,Karnik N,Chafle G.Context Sensitivity in Role-based Access Control[J].ACM SIGOPS Operating Systems Review,2002,36(3):53-66.
  • 6Sandhu R S,Coyne E J,Feinstein H L.Role-based Access Control Model[J].IEEE Computer,1996,29(2):38-47.
  • 7Sandhu R S,D Ferraiolo,R Kuhn.The NIST Model for Role-based Access Control:Towards a Unified Standard[A].Proceedings of the 5th ACM Workshop on Role-based Access Control[C].Berlin,Germany:ACM,2000.47-63.
  • 8Sandhu R. S. , Coyne E. J. , Feinstein H. L. , Youman C. E..Role- based access control models. Computer, 1996, 29 (2) :38-47
  • 9Badger L. , Sterne D. F. , Sherman D. L. , Walker K. M.. A domain and type enforcement UNIX prototype. USENIX Computing Systems, 1996, 9(1): 47-83
  • 10Hallyn Serge E. , Kearns Phil. Domain and type enforcement for Linux. In: Proceedings of the 4th Annual Linux Showcase and Conference, Atlanta, Georgia, USA, 2000, 247-260

共引文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部