期刊文献+

基于角色的层次受限委托模型 被引量:1

Role-Based Constraint Hierarchy Delegation Model
下载PDF
导出
摘要 角色委托是RBAC模型需要支持的一种重要安全策略。基于构件化的思想,在基于角色访问控制模型基础上,提出了一个受限的层次角色委托模型,该模型分别在时间约束、部分委托约束、角色依赖约束、角色冲突等方面对委托进行了限制。给出了委托授权时的冲突检测算法与用户所拥有权限的计算算法及该模型的一个应用实例。 Delegation is an important security policy supported by role based access control (RBAC) model. Based on the idea of components and role based access control model, this paper presents a constraint hierarchy Role-Based delegation model with time constraint, partial delegation constraint, roles dependency constraint, and roles conflicts constraint. The paper also explores some issues including conflicts examining algorithm and rights computing algorithm. In the end, an application example is provided using this model.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2010年第1期114-118,共5页 Journal of University of Electronic Science and Technology of China
基金 国家863重大项目(2006AA12A106)
关键词 访问控制 构件 委托 层次 access control components delegation hierarchy relation
  • 相关文献

参考文献12

  • 1SANDHU R. Rationale for the RBAC96 family of access control models[C]//ACM Workshop on Role-Based Access Control. New York: ACM Press, 1996: 38-47.
  • 2BERTINO E, BONATTI P A, FERRARI E. TRBAC: a temporal role-based access control model[J]. ACM Trans on Information and System Security, 2001, 4(3): 191-233.
  • 3JOSHI J B D, BERTINO E, GHAFOOR A. Temporal hierarchy and inheritance semantics for GTRBAC[C]//Proc of the 7th ACM Symp on Access Control Models and Technologies. New York: ACM Press, 2002.
  • 4JOSHI J B D, SHAFIQ B, GHAFOOR A, et al. Dependencies and separation of duty constraints in GTRBAC[C]//Proc of the 8th ACM Syrup on Access Control Models and Technologies. New York: ACM Press, 2003: 51-64.
  • 5田敬东,何再朗,王向东,张毓森.基于角色的强制访问控制模型研究[J].电子科技大学学报,2006,35(6):950-952. 被引量:5
  • 6TAN Liang, ZHOU Ming-Tian. Implementing discretionary access control with time character in Linux and performance analysis[J]. Journal of Electronic Science and Technology of China, 2006, 3(1): 274-280.
  • 7BARKA E, SANDHU R. A role-based delegation model and some extensions[C]//Proc of the 23rd National Information Systems Security Conference. Baltimore: NIST, 2000: 101-114.
  • 8ZHANG X W, OH S, SANDHU R S. PBDM: a flexible delegation model in RBAC[C]//Proc of the 8th ACM Symp on Access Control Models and Technologies. New York: ACM Press, 2003: 149-157.
  • 9ZHANG L, AHN G J, CHUB T. A rule-based framework for role-based delegation and revocation[J]. ACM Transactions on Information and System Security, 2003, 6(3): 404-441.
  • 10徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52

二级参考文献60

  • 1徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 2Xu Z, Feng DG, Li L, Chen H. UC-RBAC: A usage constrained role-base access control model. In: Qing SH, Gollmann D, Zhou JY, eds. Proc. of the 5th Int'l Conf. on Information and Communications Security. LNCS 2836, Heidelberg: Springer-Verlag, 2003.337-347.
  • 3Gasser M, McDermott E. An architecture for practical delegation in a distributed system. In: Cooper D, Lunt T, eds. Proc. of the1990 IEEE Computer Society Symp. on Research in Security and Privacy. Oakland: IEEE Computer Society Press, 1990. 20-30.
  • 4Gladny HM. Access control for large collections. ACM Trans. on Information Systems, 1997,15(2):154-194.
  • 5Moffett JD, Sloman MS. The source ofauthority for commercial access control. IEEE Computer, 1988,21(2):59-69.
  • 6Nagaratnam N, Lea D. Practical delegation for secure distributed object environments. Distributed Systems Engineering, 1998,5(4):168-178.
  • 7Bandmann O, Dam M, Firozabadi BS. Constrained delegation. In: Proc. of thc 23rd Annual IEEE Symp. on Security and Privacy.Oakland: IEEE Computer Society Press, 2002. 131-143. http://csdl.computer.org/comp/proceedings/sp/2002/1543/00/15430131abs.htm
  • 8Niezette M, Stevenne J. An efficient symbolic representation of periodic time. In: Finin TW, Nicholas CK, Yesha Y, eds. Proc. of the 1st Int'l Conf. on Information and Knowledge Management. LNCS 752, Springer-Verlag, 1992.
  • 9Ferriaolo D, Cugini J,Kuhn R. Role-Based access control (RBAC): Features and motivations. In: Proc. of the 11th Annual Computer Security Application Conf. New Orleans: IEEE Computer Society Press, 1995. 241-248. http://csrc.nist.gov/rbac/ferraiolo-cugini-kuhn-95.pdf
  • 10Sandhu RS, Coyne EJ, Feinstein HL, Youman CE. Role-Based access control models. IEEE Computer, 1996,29(2):38-47.

共引文献98

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部