期刊文献+

一种灵活的基于权限划分的授权代理模型

A Flexible Delegation Model Based on Permissions Division
下载PDF
导出
摘要 针对传统授权代理模型灵活性较低、结构复杂等问题,在基于权限代理模型的基础上,提出一种改进的授权代理模型灵活的基于权限划分的授权代理模型.该模型使用划分权限方法代替划分角色,将所有权限划分为3个集合:可代理权限集、半可代理权限集和不可代理权限集,实现了特定权限代理并简化了模型结构.实验结果表明,该模型在保证系统安全性的同时,使授权代理的实现和管理更简单、灵活。 In view of the problem of low flexibility and complex structure of traditional delegation models,this paper introduces an improved delegation model named flexible delegation model based on permissions division,which is built on permission-based delegation model.Instead of dividing roles,the permissions are divided into three sets in this model,which include delegable permission,semi-delegable permission and un-delegable permission.It realizes special permissions delegation and simplifies the structure of the model.The results show that this model makes the realization and management of the delegation more easy and flexible,at the same time it ensures the security of the system.
出处 《吉林大学学报(理学版)》 CAS CSCD 北大核心 2010年第5期799-804,共6页 Journal of Jilin University:Science Edition
基金 国家自然科学基金(批准号:60973041) 国家高技术研究发展计划863项目基金(批准号:2009AA010314) 吉林省科技发展计划重大项目(批准号:20076004)
关键词 权限划分 授权代理 角色 permissions division delegation role
  • 相关文献

参考文献12

二级参考文献50

  • 1孙波,赵庆松,孙玉芳.TRDM——具有时限的基于角色的转授权模型[J].计算机研究与发展,2004,41(7):1104-1109. 被引量:26
  • 2徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 3Ezedin S Barka, Ravi Sandhu. Framework for role-based delegation models. In 16th Annual Computer Security Applications Conference [ C ]. December 2000.
  • 4Zhang L, Ahn G J, Chu B T. A rule-based framework for role based delegation. In Proceedings sixth ACM SACMAT[ C]. 2001:153 - 162.
  • 5Zhang Xinwen, Sejong Oh,Ravi Sandhu. PBDM :a flexible delegation model in RBAC. In SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies [ C ]. 2003 : 149 - 157.
  • 6Ezedin S Barka, Ravi Sandhu. A role-based delegation model and some extensions. In 23rd National Information Systems Security Conference [ C ]. October 2000.
  • 7[1]Sandhu, R. Issues in RBAC . In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 21~24.
  • 8[2]Jaeger, T. On the increasing importance of constraints. In: Proceedings of 4th ACM Workshop on Role-Based Access Control. Fairefax, VA: ACM Press, 1999. 33~42.
  • 9[3]Ahn, G.-J. The RCL2000 language for specifying role-based authorization constraints [Ph.D. Thesis]. Fairfax, VA: George Mason University, 1999.
  • 10[4]Sandhu, R., Coyne, E.J., Feinstein, H.L., et al. Role-Based access control models. IEEE Computer, 1995,29(2):38~47.

共引文献94

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部