期刊文献+

角色权限控制在图纸管理系统中的应用 被引量:2

Application of Role-based Access Control in Blueprint Management System
下载PDF
导出
摘要 在研究传统RBAC访问控制模型的基础上,提出了一种应用于图纸管理系统的RBAC模型,详细讨论了安全控制中的资源对象、权限划分与角色定义等概念,对RABC基本模型进行扩展。根据用户的需求,建立了图纸管理系统的权限划分方法,并设计出数据库的逻辑结构且对数据库的设计过程和思路进行了详细的论述。系统的实际应用结果表明:采用RABC模型的图纸管理系统避免了用户和权限的直接联系,很好地实现数据库的安全访问。 Based on the research of the access control model RBAC, a RBAC model which applies to the blueprint management system is presented, the concept of resource object, purview division and role definition for the security control is discussed in detail and the RABC basic model is extended while designing this new model. According to customer needs, the purview division method of the blueprint management system is established, the logical structure of the database is designed, as well as the process and ideas of designing the database of the blueprint management system are elaborated. The actual application shows that the blueprint management system using the RABC model could avoid the direct connection between the users and privileges. The database security access was realized.
作者 肖锋
出处 《现代电子技术》 2010年第18期104-105,109,共3页 Modern Electronics Technique
关键词 访问控制 图纸管理 数据库模型 基于角色 access control blueprint management database model role-based access control
  • 相关文献

参考文献10

二级参考文献40

  • 1Ferraiolo D, Kuhn D R, Chandramouli R. Role based Access Control[M]. [s.l.]:Artech House,2003.
  • 2Chang- Joo Moon, Dae- Ha Park, Soung- Jin Park, et al.Symmetric RBAC model that takes the separation of duty and role hierarchies into consideration[J]. Computers & Security,2004(23): 126-136.
  • 3Joshi D J ,Bertino E,Ghafoor A. Temporal Hierarchy and Inheritance Semantics for GTRBAC [A]. Proc. of the Seventh ACM Symposium on Access Control Models and Methodologies[C]. Monterey, CA, USA: [s. n.], 2002.
  • 4Schneier S B.Applied Cryptography-Protocols,Algorithms and Sources Code in C [M].New York:John Wiley Sons Inc.,1994:366-367.
  • 5Sandhu R,Ferraiolo D,Kuhn R.The NIST Model for Role - Based Access Conrol:Towards A Unified Standard [A].Proceedings of 5th ACM Workshop on Role - Based Access Control [C].ACM,Berlin,Germany,July 2000.26-28.
  • 6Stinson D R.Cryptography Theory and Practice [M].New york:CRC Press Inc,1995.285-288.
  • 7David F,Ferraiolo,Ravi Sandhu,etal.Richard Kuhn and Ramaswamy Chandramouli.Proposed NIST Standard for Role-Based Access Control[J].ACM Transactions on Information and System Security,2001,4(3):224-274.
  • 8Sandhu R,Munawer Q.The ARBAC99 Model for Administration of Roles [A].The Proceedings of the Fifteenth Annual Computer Security Applications Conference [C].Scottsdale,AZ,1999.12:142-153.
  • 9Fang Chen,ACMRBAC Workshop,1996年
  • 10SANDHU R S,COYNC E J,FCINSTCIN H L,et al.Role-based access control model [J]. IEEE Computer,1996,29(2) :38-47.

共引文献147

同被引文献19

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部