期刊文献+

基于时间约束的角色访问控制模型研究 被引量:5

Temporal Role-Based Access Control Model
下载PDF
导出
摘要 基于角色的访问控制模型的研究工作近年来得到了广泛的重视,但主要工作均立足于与时间特性无关的其他方面,在现实生活中有很多与时间有关的访问控制不能够得到很好解决,特别是一些要求时间性很高或者周期性规律很强的访问控制,都需要进行时间约束的控制。为此形式化描述了一个引入时间后的角色访问控制,采用周期时间约束的方法描述了时间约束和时间约束模型,并构建了一个关于时间约束的角色访问控制系统,解决了一系列与时间有关的角色访问控制问题,增强了访问控制的力度。 The research work of RBAC is greatly emphasized in recent years. However, the main work focuses on some characters which have nothing to do with the time character. In the real life many access control with the time related cannot obtain very good solution,especially some request very high timeliness or the very strong rule periodic access control . The article describes the RBAC with time character, the temporal authorization and the temporal role - based access control model are presented by cycle restraint. And constructed one role access control system about the time restraint, solved a series problem of time and the role of the access control, enhanced the efforts of access control.
出处 《计算机技术与发展》 2009年第8期162-165,共4页 Computer Technology and Development
基金 山东省教育科研发展计划(J08LJ20)
关键词 访问控制 时间约束 RBAC 角色 access control temporal constraints RBAC role
  • 相关文献

参考文献5

二级参考文献35

  • 1Ferraiolo DF, Sandhu R, Gavrila S. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 2001,4(3):224-274.
  • 2Osbom S, Sandhu R. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, 2000,3(2):85-106.
  • 3AHN G-J, Sandhu R. Role-Based authorization constraints specification. ACM Transactions on Information and System Security, 2000,3(4):207-226.
  • 4Sandhu R. Issues in RBAC. In: Youman C, Sandhu R, Coyne E, eds. Proceedings of the 1st ACM Workshop on Role-based access control. ACM Press, 1996. 21-24.
  • 5Ferraiolo D, Kuhn R. Role based access control. In: Proceedings of the 15th National Computer Security Conference, National Institute of Standards and National Computer Security Center. 1992. 641-650.
  • 6董光宇 卿斯汉 刘克龙.带时间特性的角色授权约束.软件学报,2002,13(8):1521~1527[EB/OL].http://www.jos.org.cn/1000-9825/13/1521.pdf.,.
  • 7董光宇 卿斯汉 刘克龙.带时间特性的角色授权约束.软件学报,2002,13(8):1521~1527.http://www.jos.org.cn/1000-9825/13/ 1521.pdf.,.
  • 8WU Sheng-li, SHETH A, MILLER J, et al. Authorization and access control of application data in woddlow system[J]. Journal of Intelligent Information System, 2002,18( 1 ) : 71-94.
  • 9SANDHU R, FERRAIOLO D, KUHN R. Proposed NIST standard for role-based access control[J]. ACM Transactions on Information and System Security, 2001, 4(3):224-274.
  • 10TC00-1003, Workflow management coalition the workflow reference model[S].

共引文献90

同被引文献61

引证文献5

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部