期刊文献+

基于角色与监控组件可配置的访问控制

Configurable Access Control Based on Role and Monitoring Component
下载PDF
导出
摘要 依据制造设备共享中的访问控制需求,提出了基于角色与监控组件可配置的访问控制模型.在该模型中,监控组件封装了监控变量和对该变量的操作权限,而每个加工任务实例化为其涉及角色所对应的一系列监控界面.由各种监控组件按角色配置而成的监控界面一方面是状态数据显示以及设备控制的平台,另一方面也是执行基于任务与角色的访问控制载体.并阐述了基于角色的监控界面可重构思想和冲突处理方法. According to the access control needs in the sharing of manufacturing equipments,the configurable access control model is proposed based on the role and monitoring components.In this model,monitored variables and the privileges of operating variables are encapsulated in every monitoring component,and each processing task is instantiated as a series of the monitoring interfaces,each of which corresponds to a role involved in this task.Each monitoring interface is composed of the instances of monitoring components according to the role.On one hand,the monitoring interface is a platform for the state data display and equipment operation;on the other hand,it functions as the carrier to enforce the access control based on task and role.Role-based monitoring interface reconfiguration and an approach to resolve the conflicts are described.
出处 《湖北工业大学学报》 2010年第4期23-26,共4页 Journal of Hubei University of Technology
基金 湖北省科技厅创新团队重点项目(2009CDA151)
关键词 设备共享 访问控制 角色 可重构 equipment sharing access control role reconfiguration
  • 相关文献

参考文献6

  • 1Joshi J B D,Aref W G,Ghafoor A,et al.Security model for web-based applications[J].Communications of the ACM,2001,44(2):38-44.
  • 2Sandhu R,Coyne E J,Feinstein H L,et al.Role-based access control method[J].IEEE Computer,1996,29:20-26.
  • 3Herrmann G,Pernul G.Towards security semantics in workflow management[A] //Proceedings of the Hawaii International Conference on System Sciences[C].USA:IEEE Computer Society,1998:766-767.
  • 4Sejong Oh,Seog Park.Task-role-based access control model[J].Information Systems,2003,28:533-562.
  • 5Palmieri F,Fiore U.Audit-based access control in nomadic wireless environments[A] // Proceedings of the Computational Science and Its Applications[C].Heidelberg,Germany:Springer Verlag,2006:537-545.
  • 6文家福,王嘉祯,杨素敏,彭德云.基于角色和任务的工作流访问控制模型及其应用[J].计算机应用研究,2007,24(9):168-169. 被引量:5

二级参考文献6

  • 1SNYDER L.Formal models of capability-based protection systems[J].IEEE Transactions on Computers,1981,30(3):172-181.
  • 2PEREIRA S,PUN T.Robust template matching for affine resistant image watermarks[J].IEEE Transactions on Image Processing,2000,6(9):1123-1129.
  • 3SANDHU R S,COYNE E J,FEINSEIN H L,et al.Role based access control models[J].IEEE Computer,1996,29(2):38-47.
  • 4BOTHA R A,ELOFF J H P.Separation of duties for access control enforcement in workflow environments[J].IBM Systems Journal,2001,40(3):666-682.
  • 5史美林,杨光信,向勇,伍尚广.WfMS:工作流管理系统[J].计算机学报,1999,22(3):325-334. 被引量:291
  • 6洪帆,李静.基于任务的授权模型[J].计算机研究与发展,2002,39(8):998-1003. 被引量:10

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部