期刊文献+

引入角色的三维访问矩阵模型 被引量:1

Role-Based 3-D Access Matrix Model
原文传递
导出
摘要 传统的主体-客体访问矩阵模型都是基于特定的授权策略,将主/客体与标识或属性一一绑定实现,通用性和可扩展性不高。文章通过引入角色维,提出一种与策略无关的主体-角色-权限三维矩阵模型,可以很好地解决上述问题。 Traditional access control matrix models are all based on specific authorization policies. So there is a lack of universality and extensibility in these models. In this paper, a subject-role-permission 3-dimensional access matrix model (SRPAM), proposed by introducing a role dimension, could resolve the above-mentioned bugs referred all above.
出处 《信息安全与通信保密》 2009年第6期88-90,共3页 Information Security and Communications Privacy
关键词 访问矩阵 角色 表达能力 安全性分析 access matrix role expressive power safety analysis
  • 相关文献

参考文献8

  • 1Lampson B W.Protection[C].In:Proc of 5th Princeton Symposium on Information Science and Systems,437-443(1971).Reprinted in ACM operating Systems Review,1974,08(01) 18-24.
  • 2Harrison M H,Ruzzo W L,Ullman J D.Protection in Operating Systems[J].Communications of ACM,1976,19(08) 461-471.
  • 3李开,卢正鼎,李瑞轩,唐卓.Agent based automated trust negotiation model[J].Journal of Southeast University(English Edition),2007,23(3):469-473. 被引量:1
  • 4Lipton R J,Snyder L.A linear time algorithm for deciding subject security[J].Journal of ACM,1977,24(03) 455-464.
  • 5Sandhu R S.The typed access matrix model[C].In Proc of the IEEE Symposium on Security and Privacy,1992:122-136.
  • 6Soshi M.Safety analysis of the dynamic-typed access matrix model[C].In Proc of 6th European Symposium on Research in Computer Security,2000,106-121.
  • 7Ferraiolo D F,Sandhu R S,Gavrila S.Proposed NIST standard for role-based access control[C].ACM transactions on Information and System Security,2001,04(03) 224-274.
  • 8Aisuwaiyel M H.Algorithms design techniques and analysis[M].World Scientific Publishing Co.Pte.Ltd.2005.

二级参考文献1

同被引文献8

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部