期刊文献+

分布式系统中的RBAC管理模型 被引量:1

RBAC Administration Model in Distributed Systems
下载PDF
导出
摘要 针对在分布式环境下的RBAC管理问题,提出了一种新的分布式系统中的RBAC管理模型。该模型没有专门保存一个全局的RBAC访问控制策略,各子系统只是保存自身的访问控制策略。当策略发生改变后,模型中各子系统根据管理指令进行自身的策略改变,使整个分布式系统中的RBAC访问控制策略达到一致。 A new model was proposed to meet the problem of RBAC Administration in Distributed Systems. No globally RBAC access control policy has been store in this model and each subsystem just save its own policy. When the policy changes, the subsystems change its own access control policy by Administrative Commands, then make the RBAC Administration in Distributed Systems consistent.
作者 袁园 梁少华
出处 《微计算机信息》 2009年第33期200-201,176,共3页 Control & Automation
关键词 分布式 RBAC 访问控制策略 管理指令 Distributed RBAC access control policy Administrative Commands
  • 相关文献

参考文献6

  • 1RBAC Standard, ANSI INCITS 359-2004, 2004.
  • 2M.A.C. Dekker,J. Crampton and S. Etalle.RBAC Administration in Distributed Systems Proceedings of the 13th ACM symposium on Access control models and technologies pages 93-101, Jun. 2008.
  • 3D. F. Ferraiolo, D. R. Kuhn, and R. Chandramouli.Role-based Access Control. Computer Security Series.Artech House, 2003.
  • 4A. Kern, A. Schaad, and J. Moffett. An administration concept for the enterprise role-based access control model. In Proceedings of the 8th ACM Symposium on Access Control Models and Technologies (SACMAT), pages 3-11, 2003.
  • 5夏榆滨,宣明付.基于RBAC的统一权限管理系统研究[J].微计算机信息,2006,22(10X):114-116. 被引量:23
  • 6杨庚,沈剑刚,容淳铭.基于角色的访问控制理论研究[J].南京邮电大学学报(自然科学版),2006,26(3):1-8. 被引量:15

二级参考文献27

  • 1李芳,范玉妹,胡志兴.操作系统安全模型研究及方案设计[J].微计算机信息,2004,20(9):126-128. 被引量:10
  • 2LAMPSON B W. Protection of Information System[ C]//Proc 5th Princeton Conference on Information Sciences and Systems. Princeton, 1971:437 -447.
  • 3CONWAY R W, MAXWELL W L, MORGAN H L. On the implementation of security measures in information systems[J]. Communications of the ACM, 1972,15 (4) :211 - 220.
  • 4DENNING D E. A Lattice Model of Secure Information Flow [ J ].Communications of the ACM, 1976,19 (5) :236 - 243.
  • 5SANDHU R, COYNE E J, FEINSTEIN H L, et al Role-based access control models[J] IEEE Computer, 1996,29 (2) :38 -47.
  • 6SANDHU S. The ARBAC97 Model for Role-Based Administration of Roles: Preliminary Description and Outline[C]//Proceedings of the second ACM workshop on Role-based access control. November 1997:41 - 50.
  • 7MOYER M J, ABAMAD M. Generalized Role-Based Access Control [ C ]//Proceedings of 21 st International Conference on Distributed Computing Systems. April 2001:391 -398.
  • 8MOFFETT J D. Control Principles and Role Hierarchies[ C]//Proceedings of the 3rd ACM Workshop on Role-Based Access Control(RBAC'98). 1998:91-101
  • 9JOSHI J B D, BERTINO E, GHAFOOR A. Hybrid role hierarchy for generalized temporal role based access control model[ C]//Proceedings of 26th Annum International Conference on Computer Software and Applications(COMPSAC 2002). 2002:951 -956.
  • 10SANDHU R, BHAM1D1PAT 1. Role-Based Administration of User-Role Assignment: The URA97 Model and its Oracle Implementation[J]. Journal of Computer Security, 1999(7) : 43 -58.

共引文献36

同被引文献5

  • 1Ravi S.Standhu, Edward J.Coyne, Hal L.Feinstein. Role-Based Access Control Models [C] . In:IEEE Computer. Volume 29, Number 2, February 1996, pages 38-47.
  • 2M.A.C. Dekker,J. Crampton and S. Etalle. RBAC Administration in Distributed Systems [C]. In: Proceedings of the 13th ACM symposium on Access control models and technologies, pages 93- 101, Jun.2008.
  • 3Ninghui Li, Ziqing Mao. Administration in role-based access control[C]. In:ASIACCS'07. March 20-22, 2007. pages 127-138.
  • 4Diala Abi Haidar, Nora Cuppens-Boulahia, Frederic Cuppens. An Extended RBAC Profile of XACML. Sws'06. November 3, 2006. pages 13-21.
  • 5谭振,杨贯中,曾熠.一种扩展的RBAC模型——ERBAC[J].计算机系统应用,2009,18(11):84-86. 被引量:3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部