期刊文献+

基于模糊的RBAC模型研究与优化 被引量:2

Research and Optimization of Fuzzy-based RBAC Model
下载PDF
导出
摘要 传统的RBAC策略在企业用户数量剧增时,角色指派和权限维护成为系统管理员沉重的负担。为简化管理员的工作、规范安全策略,提出一种基于模糊的RBAC优化模型。使用位图矩阵进行角色信任度计算。将方差引入因素权重向量的调整策略,改进取大取小操作的局限性。对相似的用户聚类,在聚类中分享群体经验提高模型的精确性。为用户引入历史互斥权限表,实现带有责任分离约束的模糊RBAC模型。 With the rapid increase of the enterprise users,it is a tiresome task for the system administrator to assign roles and maintain permissions in traditional Role-Based Access Control(RBAC) strategy.In order to simplify the administrator’s work and standardize security strategy,an optimized RBAC model based on fuzzy is proposed.Bitmap matrix is used for computing role’s trustworthiness.Variance is applied to adjust attribute weight vector to improve max-min operation’s limitation.By clustering similar users,group experience is shared among the users within the same cluster to improve the accuracy of the model.A fuzzy RBAC model with separation of duty constraint is implemented by enforcing a historical,mutual exclusive permission table for each user.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第13期137-139,共3页 Computer Engineering
关键词 模糊 基于角色的访问控制 聚类分析 责任分离 fuzzy Role-Based Access Control(RBAC) clustering analysis separation of duty
  • 相关文献

参考文献5

  • 1Takabi H,Amini M,Jalili R.Trust-based User-role Assignment in Role-based Access Control[C] //Proc.of International Conference on Computer Systems and Applications.Amman,Jordan:IEEE Computer Society,2007:807-814.
  • 2Takabi H,Amini M,Jalili R.Enhancing Role-based Access Control Model Through Fuzzy Relations[C] //Proc.of the 3rd International Symposium on Information Assurance and Security.Manchester,UK:IEEE Computer Society,2007:131-136.
  • 3Takabi H,Amini M,Jalili R.Separation of Duty in Role-based Access Control Model Through Fuzzy Relations[C] //Proc.of the 3rd International Symposium on Information Assurance and Security.Manchester,UK:IEEE Computer Society,2007:125-130.
  • 4Wang Cuiru,Liu Shuangxi.Study on Fuzzy Theory Based Web Access Control Model[C] //Proc.of International Symposium on Information Processing.Moscow,Russia:IEEE Computer Society,2008:178-182.
  • 5王宇新,王政,郭禾,刘天阳,田佳.基于XML图的RBAC模型研究[J].计算机应用,2009,29(1):185-188. 被引量:3

二级参考文献11

  • 1霍晓丽,卢正鼎.在角色访问控制系统中实现职责分离的方法[J].计算机工程与应用,2006,42(1):74-76. 被引量:6
  • 2徐松,赵曦滨,顾明.网格环境下的分布式RBAC模型框架[J].计算机工程,2006,32(6):163-166. 被引量:5
  • 3杜萍,刘弘.协同设计系统中基于XML的访问控制实现[J].计算机应用研究,2007,24(1):174-176. 被引量:2
  • 4段隆振,文锋,黄水源,冯豫华.一种描述RBAC角色层次关系和互斥关系的模型及实现[J].南昌大学学报(理科版),2006,30(6):601-604. 被引量:4
  • 5顾春华,肖宝亮.RBAC模型层次关系中的角色权限[J].华东理工大学学报(自然科学版),2007,33(1):96-99. 被引量:17
  • 6HAO H, WONG R K. A role-based access control model for xml repositories [ C]// Proceedings of the 1 st International Conference on Web Information Systems Engineering. Hong Kong: IEEE Computer Society, 2000:138 - 145.
  • 7SANDHU R, COYNE E J. Role based access control models[ J]. IEEE Computer, 1996, 29(2) : 38 -47.
  • 8CHADWICK D W, XU W, OTENKO S, et al. Multi-session separation of duties for rbac[ C]// IEEE 23rd International Conference on Data Engineering Workshop. Istanbul: IEEE Computer Society, 2007. 744-753.
  • 9GAIL-JOON A. Specification and classification of role-based authorization policies, enabling technologies[ C]//Proceedings 12th IEEE International Workshops on Infrastructure for Collaborative Enterprises. Linz: IEEE Computer Society, 2003:202 -207.
  • 10SHAFIQ B, MASOOD A, JOSHI J. A role-based access control policy verification framework for real-time systems[ C]// 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems. Sedona: IEEE Computer Society, 2005:13-20.

共引文献2

同被引文献20

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部