期刊文献+

支持属性委托模型中委托撤销研究

Study on Delegation Revocation in Attribute Supported Delegation Model
下载PDF
导出
摘要 支持属性的委托模型(ABDM)中,受托者必须同时满足委托先决条件(CR)和委托属性表达式(DAE)才能获得委托权限或角色。在该模型中,委托撤销完成将委托出去的权限收回到委托者处的工作。首先介绍了ABDM提出的两种新的撤销模式及其带来的多步委托中委托与撤销的优先级问题。然后详细讨论了委托与撤销的关系,对两种解决办法:"先来先响应"和"先撤销后委托"进行了分析,提出了两种方法的适应场合。 In Attribute Supported Delegation Model (ABDM), delegatee must satisfy both delegation prerequisite condition (CR) and delegation attribute expression (DAE) when assigned to a delegation role. In ABDM, revocation focuses on how to revoke those delegated roles or permissions from delegatee. This paper first introduced two new sorts of revocations,which bring about priority between multi-step delegation and revocation. Then analyzed the relation between delegation and revocation and proposed two solutions:" first request first response" and "revocation first then delegation". We also discussed different situations fitting these two solutions.
出处 《计算机科学》 CSCD 北大核心 2010年第6期217-219,共3页 Computer Science
基金 国家自然科学基金(No.60803027)资助
关键词 访问控制 RBAC 委托 撤销 属性 Access control, RBAC, Delegation, Revocation, Attribute
  • 相关文献

参考文献10

  • 1Sandhu R,Coyne E,Feinstein H, et al. Role-Based Access Control Models[J]. IEEE Computer, 29 (2) : 38-47.
  • 2Barka E, Sandhu R. Framework for Role-Based Delegation Models[C]//Proc, of 16th Annual Computer Security Application Conference (ACSAC2000). New Orleans, USA: IEEE Computer Society Press, 2000.
  • 3Barka E, Sandhu R. A role-based delegation model and some extensions[C]//Proc, of 23rd National Information Systems Security Conference (NISSC 2000). Baltimore, USA, 2000.
  • 4Zhang Longhua, Ahn Gail-Joon, Chu Bei-Tseng. A rule - based framework for role-baseddelegation[C]//Proc of SACMAT ' 01. Chantilly, VA, USA: ACM press, 2001.
  • 5Tamassia R, Yao Danfeng, Winsborough W H. Role-based cascaded delegation [C] //Proc. of the SACMAT' 04. Yorktown Heights, New York, USA: ACM press, 2004.
  • 6Zhang Xinwen, Oh S, Sandhu R PBDM: A Flexible Delegation Model in RBAC[C]//Proc. of the SACMAT' 03. Como, Italy: ACM press, 2003.
  • 7赵庆松,孙玉芳,孙波.RPRDM:基于重复和部分角色的转授权模型[J].计算机研究与发展,2003,40(2):221-227. 被引量:32
  • 8叶春晓,吴中福,符云清,钟将,冯永.基于属性的扩展委托模型[J].计算机研究与发展,2006,43(6):1050-1057. 被引量:17
  • 9Stoupa K, Vakali A, Li Fang, et al. XML-based revocation and delegation in a distributed environment[C]//Proceedings of the EDBT International Workshop on Database Technologies for Handling XML information on the Web. Heraklion, Greece, 2004:299-308.
  • 10孙波,赵庆松,孙玉芳.TRDM——具有时限的基于角色的转授权模型[J].计算机研究与发展,2004,41(7):1104-1109. 被引量:26

二级参考文献39

  • 1Ravi S Sandhu.Future directions in role-based access control models.Mathematical Methods,Models and Architectures for Computer Networks Security,St Petersburg,2001
  • 2Ravi S Sandhu,Edward J Coyne,Hal L Feinstein,et al.Role-based access control models.IEEE Computer,1996,29(2):38~47
  • 3Sylvia L Osborn,Ravi S Sandhu,Qamar Munawer.Configuring role-based access control to enforce mandatory and discretionary access control policies.ACM Trans on Information and System Security,2000,3(2):85~106
  • 4Gail-Joon Ahn,Ravi S Sandhu.The RSL99 language for role-based separation of duty constraints.ACM Workshop on Role-Based Access Control,Fairfax,Virginia,USA,1999
  • 5Ravi S Sandhu,Venkata Bhamidipati,Qamar Munawer.The ARBAC97 model for role-based administration of roles.ACM Trans on Information and System Security,1999,2(1):105~135
  • 6David F Ferraiolo,Ravi Sandhu.A proposed standard for role-based access control.ACM Trans on Information and System Security,2001,4(3):25~29
  • 7Sun Microsystems Company.Trusted Solaris Operating Environment.http://wwws.sun.com/software/solaris/trustedsolaris/features.html,2003
  • 8LouAnna Notargiacomo.Role-based access control in Oracle 7 and trusted Oracle 7.The 1st ACM Workshop on Role-Based Access Control,Gaithersburg,Maryland,United States,1995
  • 9Joon S Park,Ravi S Sandhu.RBAC on the Web by smart certificates.In:Proc of the 4th ACM Workshop on Role-Based Access Control.New York:ACM Press,1999.1~9
  • 10Joon S Park,Ravi S Sandhu,SreeLatha Ghanta.RBAC on the Web by Secure Cookies.International Federation for Information Processing the 13th Int'l Conf on Database Security,Deventer,Washington,1999

共引文献57

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部