期刊文献+

TRBAC模型在办公自动化中的应用

Application of TRBAC Model to Office Automation
下载PDF
导出
摘要 信息系统访问控制已越来越受到重视,特别是在办公自动化领域中控制资源访问要求的访问控制。但是传统的角色访问控制模型和任务访问控制模型并不能满足工作流多变的控制需求,针对此问题,引出了基于任务和角色的访问控制模型,它能够满足办公自动化所涉及的业务领域对权限管理的要求。最后,结合实际的办公自动化系统的开发,给出了基于任务和角色的访问控制模型的一个具体的应用实例。 Growing attention has been paid to access control in information system, especially the access control of resource access requires in office automation area. However, traditional role-based access control model and task-based access control model cannot satisfy the workflow changeable requirements. To solve these problems, the task-role-based access control mode is introduced, which can satisfy the requirements of authority managements from business fields related to office automation. At the end of the paper, combined with the practical development of office automation system, the detailed implementation instance of task-role-based access control mode is provided.
出处 《计算机系统应用》 2010年第7期175-178,共4页 Computer Systems & Applications
基金 湖南省科技计划(2008FJ3184) 湖南省自然科学基金(06JJ20075)
关键词 TRBAC模型 办公自动化 访问控制 TRBAC model office automation access control
  • 相关文献

参考文献6

二级参考文献27

  • 11,Ferraiolo D F, Kuhn R. Role-Based access control. In: Proceedings of the 15th National Computer Security Conference. Baltimore, MD, 1992. 554~563, http://hissa.ncsl.nist.gov/kuhn/
  • 22,Sandhu R, Samarati P. Access control: principles and practice. IEEE Communications, 1994,32(9):40~48
  • 33,Ramaswamy C, Sandhu R. Role-Based access control features in commercial database management systems. In: Proceedings of the 21st National Information Systems Security Conference. Virginia: U.S. Government Printing Office, 1998, http://www.list.gmu.edu/conferen.htm
  • 44,Sandhu R, Coyne E J, Feinstein H L et al. Role-Based access control models. IEEE Computers, 1996,29(2):38~47
  • 55 Sandhu R. Rationale for the RBAC96 family of access control models. In: Proceedings of the 1st ACM Workshop on Role-Based Access Control. ACM, 1997. http://www.list.gmu.edu/conferen.htm
  • 6L Snyder. Formal Models of Capability-based Protection Systems[ J].IEEE Transactions on Computers, 1981,30(3 ) :172-181.
  • 7R Sandhu, E Coyne, H Feinstein. Role-based Access Control Models[ J]. IEEE Computer, 1996,29 (6) :38-47.
  • 8D Ferraiolo, R Sandhu,et al. Proposed NIST Standard for Role-based Access Control [ J ]. ACM Transactions on Information and System Security(TISSEC) ,2001,4(3) :224-274.
  • 9R Thomas, R Sandhu. Task-Based Authorization Controls(TBAC) : A Family of Models for Active and Enterprise-Oriented Authorization Management[ C]. Lake Tahoe, CA: Proceedings of the 11th IFIP WG11.3 Conference on Database Security, 1997.
  • 10Gail-Joon Ahn, Myong Kang,et al. Injecting RBAC to Secure a Webbased Workflow System[ C]. ACM RBAC, 2000.

共引文献394

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部