期刊文献+

角色访问控制在协同环境中的扩展 被引量:4

Extension of Role-Based Access Control in Collaborative Circumstance
原文传递
导出
摘要 信息安全技术领域一个非常重要的方面是访问控制。在大型的分布式协同系统中,用户与角色的数量众多,关系复杂,RBAC模型存在一定的局限性。以基于角色的访问控制模型为基础,针对分布式协同环境下的特征,将RBAC在分布式协同环境下进行了扩展,提出一种利用角色互斥的方法来实现职责分离原则,将角色互斥分为静态和动态互斥并给出形式化描述,使得扩展后的模型在权限方面提高了安全性。 Access control is avery important research direction of the information security field. In large network-based distributed collaborative application systems, there are large quantity of users and roles, and the relations of users and roles are quite complex, thus RBAC is not suitable for this situation. Based on RBAC model and according to characteristics of the distributed collaborative circumstance, the RBAC model is extended in the distributed collaborative circumstance. A new method based on mutually exclusive roles is proposed to implement the separation of duties. Mutually exclusive roles are classified into two kinds as static and dynamic, and formal descriptions of the static and dynamic mutually exclusive roles are given in this paper.
出处 《通信技术》 2010年第1期84-85,88,共3页 Communications Technology
关键词 协同环境 访问控制 职责分离 collaborative circumstance access control separation of duties
  • 相关文献

参考文献7

二级参考文献23

共引文献6

同被引文献27

  • 1戴祝英,左禾兴.基于角色的访问控制模型分析与系统实现[J].计算机应用研究,2004,21(9):173-175. 被引量:21
  • 2陈岌,薛质,李生红,荆涛.整合分级的角色访问控制系统的研究与设计[J].信息安全与通信保密,2005(4):63-64. 被引量:1
  • 3金海,訾小超,潘理,李建华.基于程序的访问控制研究与实现[J].信息安全与通信保密,2006,28(7):65-67. 被引量:2
  • 4I SANDHU R S, COYNE E J, FEINSTEIN H L, et al. Role- Based Access Control Models[J]. IEEE Computer, 1996, 29(2) : 38-47.
  • 5FERRAIOLO D F, SANDHU R, GAVRILA S, et al. Proposed NIST Standard for Role-based Access Control[J]. ACM Transactions on Information and System Security (TISSEC). 2001, 4(3): 224-274.
  • 6FERRAIOLO D F, KUHN D Richard, CHANDRAMOULI Ramaswamy. Role-Based Access Control[C]. Norwood, MA: Artech House, Inc., 2003.
  • 7ZABBIX SIA. ZABBIX Manual v2.0 rev 9[Z/OL]. (2012) [2012-11-20]. http: //www.zabbix. corn/documentation.
  • 8樊治平,冯博,俞竹超.知识协同的发展及研究展望[J].科学学与科学技术管理,2007,28(11):85-91. 被引量:87
  • 9Cloud Security Alliance. Security Guidance for Critical Areas of Focus in Cloud Computing V2.1[EB/OL].http://wenku.baidu.com/ view/12ca72c76137ee06eff918c3.html,2011.
  • 10ZHENG Weimin,XU Pengzhi,HUANG Xiaomeng. Design a Cloud Storage Platform for Pervasive Computing Environments[J].CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS,2010,(13):141-151.

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部