期刊文献+

RBAC中条件周期特性角色激活约束研究

Research on constraint of conditions and periodic in user activity in RBAC
下载PDF
导出
摘要 对RBAC中的角色激活特性进行研究,提出了带条件周期角色激活特性的CP-RBAC模型。分析了模型的一致性状态,讨论了一致性状态维护问题;并针对条件周期约束问题给出了相应算法来解决会话的状态转变问题。CP-RBAC模型能够使系统更加安全有效,降低大规模网络应用的复杂性和安全管理的费用,为网络安全防护产生更大的经济和技术效益。 Based on the research on the constraint of user activity in RBAC,this paper described a new RBAC model with conditions and periodic in user activity character. Analyzed the consistent state of the model and discussed the problem for maintaining the consistent state. Developed some algorithms to solve the state change problem of the time-constraint and the sessions. The new model made the system be more safer and effective. Also it could reduce complexity of mass network application and cost of safety management. It could create a great deal of economic and technological benefit in safety management of Internet.
出处 《计算机应用研究》 CSCD 北大核心 2010年第8期3034-3037,3052,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(60573141 60773041) 国家"863"计划资助项目(2007AA01Z404 2007AA01Z478) 安徽省高校省级自然科学研究资助项目(KJ2008B116) 安徽省高等学校省级优秀青年人才基金资助项目(2009SQRZ139)
关键词 角色 访问控制 条件周期 用户激活 role access control conditions and periodic user activity
  • 相关文献

参考文献12

  • 1SANDHU R S,COYNE E J,FEINSTEIN H L,et al.Role-based access control models[J].IEEEE Computer,1996,29(2):38-47.
  • 2FERRAIOLO D F,KUHN D R,CHANDRAMOULI R.Role-based access control[M].London:Artech House,2003.
  • 3NA S Y,CHEON S.Role delegation in role-based access control[C] //Proc of the 5th ACM Workshop on Role-based Access Control.New York:ACM Press,2000:39-44.
  • 4LUPU E C,MARRIOTT D A,SLOMAN M S,et al.A policy based role framework for access control[C] //Proc of the 1st ACM Workshop on Role-based Access Control.Gaithersbrug,Maryland:ACM Press,1996:28-29.
  • 5CRAMPTON J.Specifying and enforcing constraints in role-based access control[C] //Proc of the 8th ACM Workshop on Role-based Access Control.Como:ACM Press,2003:43-50.
  • 6袁中兰,夏光升,李小标,等.RBAC中的用户激活约束研究[C] //全国网络与信息安全技术研讨会.2007:447-452.
  • 7黄建,卿斯汉,温红子.带时间特性的角色访问控制[J].软件学报,2003,14(11):1944-1954. 被引量:73
  • 8BERTINO E,BETTINI C,FERRARI E,et al.An access control model supporting periodicity constraints and temporal reasoning[J].ACM Trans on Database Systems,1998,23(3):231-285.
  • 9BERTINO E,BONATTI P A,FERRARI E.A temporal role-based access control model[J].ACM Trans on Information and System Security,2001,4(3):191-223.
  • 10夏启寿,范训礼,殷晓玲.基于时间的RBAC转授权模型[J].西北大学学报(自然科学版),2008,38(6):932-936. 被引量:7

二级参考文献33

  • 1孙波,赵庆松,孙玉芳.TRDM——具有时限的基于角色的转授权模型[J].计算机研究与发展,2004,41(7):1104-1109. 被引量:26
  • 2刘晓霞,雷清,叶宏,谢倩茹.嵌入式实时操作系统安全策略的实现[J].西北大学学报(自然科学版),2006,36(4):551-554. 被引量:4
  • 3SANDHU R S, COYNE E J, FEINSTEIN H L, et al. Role-based access control models [ J]. IEEEE Computer, 1996, 29(2) :38-47.
  • 4NA S Y, CHEON S. Role delegation in role-based access control[ C ]//REBENSBURG K. Symposium on access control models and technologies, Proceedings of the 5th ACM workshop on Role-based access control. Berlin: ACM, 2000:39-44.
  • 5LUPU E C, MARRIOTT D A, SLOMAN M S, et al. A policy based role framework for access control [ C ]//YOUMAN C E. Symposium on access control models and technologies, Proceedings of the 1st ACM Workshop on Role-based access control. Gaithersburg, Maryland: ACM, 1996:28-29.
  • 6CRAMPTON J. Specifying and enforcing constraints in role-based access control[ C ] //FERRARI E. Symposium on access control models and technologies, Proceedings of the 8th ACM Workshop on Role-based access control. Como:ACM, 2003:43-50.
  • 7ELISA B, ANDREA B P, ELENA F. TRBAC: A temporal role-based access control model [ J ]. ACM Transactions on Information and Systems Security, 2000,4 ( 3 ) : 21-30.
  • 8ELISA B, CLAUDIO B, ELENA F, et al. A temporal access control mechanism for database systems [ J ]. IEEE Trans on Knowledge and Data Engineering, 1996, 8( 1 ) : 67 -80.
  • 9ZHANG L H, AHN G J, CHUB T. A rule-based framework for role-based delegation[ C]//SANDHU R S. Symposium on access control models and technologies, Pro- ceedings of the 6th ACM Workshop on Role-based access control. Chantilly, Virginia:ACM, 2001:404-441.
  • 10SANDHU R S, COYNE E J, FEINSTEIN H L, et al. Role-based access control models[J]. IEEE Computer,1996,29(2) :38-47.

共引文献78

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部