期刊文献+

基于角色委托模型及扩展 被引量:2

A ROLE-BASED DELEGATION MODEL AND ITS EXPANSION
下载PDF
导出
摘要 角色委托是RBAC模型需要支持的一种重要安全策略。其主要思想是系统中的主动实体将角色委托给其他主动实体,以便以前者名义执行特定的工作。提出一个基本的角色委托模型,在该模型的基础上,从应用出发,分别在时间约束、部分委托约束、角色依赖约束、层次角色模型的委托限制方面进行了扩展,给出了委托权限的回收方法,为模型在实际环境中的应用奠定了基础。 Role delegation is an important security policy that should be supported for RBAC model.The basic idea of delegation is that some active entities in a system delegate their roles to other active entities to carry out some specific functions on behalf of the former.This paper presents a basic role-based delegation model.Based on it and proceeding from the application,some extensions to this model are explored,including time constraint,partial delegation constraint,role dependency constraint,and delegation restriction of hierachical role model.It provides the means of revocation of delegation permission,and lays the foundation for the application of the model in practical conditions.
出处 《计算机应用与软件》 CSCD 2010年第1期210-212,230,共4页 Computer Applications and Software
关键词 RBAC 委托 约束 RBAC Delegation Constraint
  • 相关文献

参考文献9

  • 1Barka E, Sandhu R. A role-based delegation model and some extensions [C]//Proceedings of the 23rd National lnfomation Systems Security Conference Marc'land, USA,2000 : 101 - 110.
  • 2Barka E, Sandhu R. Framework for role-based delegation models[ C ]// Proc. of the 16th Annual Computer Security Application Conf. IEEE Computer Society Press,2000 : 168 - 176.
  • 3Zhang X W,Oh S, Sandhu RS. PBDM:A flexible delegation model in RBAC [ C ]//Ferrari E, Ferraiolo D, eds. Proc. of the 8th ACM Symp. on Access Control Models and Technologies. New York: ACM Press, 2003 : 149 - 157.
  • 4Zhang L, Ahn G J, Chu B T. A rule-based framework for role-based delegation and revocation[ J]. ACM Transactions on Information and System Security,2003,6(3 ) :404 -441.
  • 5徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 6Bandmann O, Firozabadi B S, Dam M. Constrained delegation [ C ]// Proceedings of the 23rd IEEE Symposium on Security and Privacy, Berkeley, Ca-itbrnia, 2002 : 131 - 143.
  • 7Data Generae,Managing security on DG/UX system. Data General Corporation, Westborn, Massachusetts : Technical Report 093 - 701138 - 04,1996.
  • 8张宏,贺也平,石志国.基于周期时间限制的自主访问控制委托模型[J].计算机学报,2006,29(8):1427-1437. 被引量:20
  • 9翟征德,冯登国,徐震.细粒度的基于信任度的可控委托授权模型[J].软件学报,2007,18(8):2002-2015. 被引量:34

二级参考文献56

  • 1徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 2Xu Z, Feng DG, Li L, Chen H. UC-RBAC: A usage constrained role-base access control model. In: Qing SH, Gollmann D, Zhou JY, eds. Proc. of the 5th Int'l Conf. on Information and Communications Security. LNCS 2836, Heidelberg: Springer-Verlag, 2003.337-347.
  • 3Gasser M, McDermott E. An architecture for practical delegation in a distributed system. In: Cooper D, Lunt T, eds. Proc. of the1990 IEEE Computer Society Symp. on Research in Security and Privacy. Oakland: IEEE Computer Society Press, 1990. 20-30.
  • 4Gladny HM. Access control for large collections. ACM Trans. on Information Systems, 1997,15(2):154-194.
  • 5Moffett JD, Sloman MS. The source ofauthority for commercial access control. IEEE Computer, 1988,21(2):59-69.
  • 6Nagaratnam N, Lea D. Practical delegation for secure distributed object environments. Distributed Systems Engineering, 1998,5(4):168-178.
  • 7Bandmann O, Dam M, Firozabadi BS. Constrained delegation. In: Proc. of thc 23rd Annual IEEE Symp. on Security and Privacy.Oakland: IEEE Computer Society Press, 2002. 131-143. http://csdl.computer.org/comp/proceedings/sp/2002/1543/00/15430131abs.htm
  • 8Niezette M, Stevenne J. An efficient symbolic representation of periodic time. In: Finin TW, Nicholas CK, Yesha Y, eds. Proc. of the 1st Int'l Conf. on Information and Knowledge Management. LNCS 752, Springer-Verlag, 1992.
  • 9Ferriaolo D, Cugini J,Kuhn R. Role-Based access control (RBAC): Features and motivations. In: Proc. of the 11th Annual Computer Security Application Conf. New Orleans: IEEE Computer Society Press, 1995. 241-248. http://csrc.nist.gov/rbac/ferraiolo-cugini-kuhn-95.pdf
  • 10Sandhu RS, Coyne EJ, Feinstein HL, Youman CE. Role-Based access control models. IEEE Computer, 1996,29(2):38-47.

共引文献94

同被引文献7

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部