期刊文献+

基于REST风格的RBAC模型研究 被引量:3

RESEARCH ON REST-STYLE RBAC MODEL
下载PDF
导出
摘要 以角色为中心的RBAC(Role-Based Access Control)访问控制在应用系统权限设计过程中发挥着关键的作用。随着系统规模的不断扩大,传统的Web应用中所使用RBAC模型在检索效率、权限维护等多方面已经严重制约了系统扩展和性能提升。为改善这一现状,特引入了REST(Representational State Transfer)架构风格。本着以资源为中心的设计理念,通过对RBAC模型的深入理解以及对传统风格下RBAC模型缺陷的详细分析,提出一种全新的适用于REST风格的RBAC模型,并对其高效性作出了数学论证。 The role-centred RBAC access control plays a key role in the process of permission management design in application system. With the constant expansion of the application scale, both search efficiency and permission maintenance problems of RBAC model used in tra- ditional Web application occurred, which had severely limited the scalability and performance of the system. To meliorate the situation, REST architectural style is introduced. Based on resource-centred designing conception, by thorough understanding of the RBAC model, and through analyzing the drawbacks of traditional RBAC model in detail, a brand new RBAC model suitable for REST style is established, and a mathematical proof is given in order to demonstrate its high efficiency.
作者 边小凡 赵峰
出处 《计算机应用与软件》 CSCD 2009年第9期162-164,共3页 Computer Applications and Software
关键词 RBAC 架构风格 REST 以资源为中心 Role-based access control (RBAC) Architectural style Representational sate transfer (REST) Resource-centred
  • 相关文献

参考文献5

  • 1Sandhu R S,Coyne E J,Feinstein H L,et al. Role-based access control models[ C]. USA: IEEE Computer,1996.
  • 2桂艳峰,林作铨.一个基于角色的Web安全访问控制系统[J].计算机研究与发展,2003,40(8):1186-1194. 被引量:20
  • 3Fielding R T. Architectural styles and the design of network-based software architectures [ D ]. USA : University of California, Irvine,2000.
  • 4黄翀.REST开发框架纵览[J].软件世界,2007(17):40-41. 被引量:5
  • 5Richardson L, Ruby S. RESTful Web Services[ M]. USA: O'Reilly Media, Inc ,2007.

二级参考文献21

  • 1R Sandhu, V Bhamidipati, O Munawer. The ARBAC97 model for role-based administration of roles. ACM Trans on Information and System Security, 1999, 2( 1 ) : 105--135.
  • 2J Luciani. Server cache synchronization protocol (SCSP). RFC2334, 1998.
  • 3D Wessles, K Claffy. Application of Internet cache protocol(ICP), version 2. RFC 2187, 1997.
  • 4D Wessles, K Claffy. Internet cache protocol(ICP), version 2.RFC 2186, 1997.
  • 5D Wessles, K Claffy. ICP and the squid Web cache. National Laboratory for Applied Network Research. 1997. http://www. nlanr, net/-- wessels/Papers /icp-squid. ps. gz.
  • 6D Wessels. The squid intemet object cache. National Laboratory for Applied Network Research. 1997. http.//squid. nlanr.net/Squid/
  • 7EnCommerce. getAccess. 2001. http://www. encommerce.com/products.
  • 8R Sandhu, E Coyne, H Feinstein et al. Role-based access control model. IEEE Computer, 1995, 29(1): 38--47.
  • 9J Park, R Sandhu, G Ahn. Role-based access control on the Web.ACM Trans on Information and System Security, 2000, 4( 1 ) : 37--71.
  • 10C Ramaswamy, R Sandhu. Role-based access control features in commercial database management systems. In: Proc of the 21st National Information Systems Security Conf. CA: ACM Press,1998.

共引文献23

同被引文献18

引证文献3

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部