期刊文献+

带负授权RBAC模型的OWL表示及冲突检测 被引量:4

Representaion of RBAC model with negative authorization in OWL and conflict detection
下载PDF
导出
摘要 提出带负授权和权限层次的扩展RBAC模型并分析模型中由负授权引起的冲突。用OWL-DL表示该扩展模型并说明如何使用OWL-DL推理引擎检测扩展模型中潜在的冲突。 This paper presents an extended model of RBAC with negative authorization and permission hierarchy and analyzes the conflicts due to negative authorization.It uses OWL-DL to represent the extended model and shows how to use an OWL-DL reasoner to detect the potential conflicts in the extended model.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第30期82-85,共4页 Computer Engineering and Applications
基金 新疆维吾尔自治区自然科学基金No.2009211B05 新疆大学自然科学基金No.BS090103~~
关键词 基于角色的访问控制 Web本体语言(OWL) 冲突检测 Role Based Access Contro(lRBAC); Web Ontology Language(OWL); conflict detection;
  • 相关文献

参考文献12

  • 1Sandhu R S,Coynek E J,Feinsteink H L,et al.Role-based access control models[J].IEEE Computer,1996,29(2):38-47.
  • 2American National Standards Institute.American national standard for information technology-role based access control[S/OL].2004. http: //csrc.nist.gov/rbac/.
  • 3Jajodia S, Samarati P, Sapino M, et al.Flexible support for multipie access control policies[J].ACM Transactions on Database Systems, 2001,26: 214-260.
  • 4Bertino E,Samarati P,Jajodia S.An extended authorization model for relational databases[J].IEEE Transactions on Knowledge and Data Engineering,1997,9:85-101.
  • 5Al-Kahtani M A, Sandhu R.Rule-based RBAC with negative authorization[C]//Proceedings of the 20th Annual Computer Security Applications Conference, ACSAC' 04, December 06-10 2004: 405 -415.
  • 6Heilili N, Chen Y, Zhao C, et al.An OWL-based approach for RBAC with negative authorization[C]//LNAI 4092: First International Conference on Knowledge Science,Engineering and Management, KSEM' 06, Guilin, China, 2006: 164-175.
  • 7Moses T.eXtensible access control markup language(XACML) version 2.0[S/OL].2005.http ://docs.oasis-open.org/xacml/2.0/aceess_ control-xacml-2.0-core-spec-os.pdf.
  • 8Damianou N, Dulay N, Lupu E, et al.The ponder policy specification language[C]//Proceedings of Workshop on Policies for Distributed Systems and Networks, POLICY 2001, Bristol, UK, 2001.
  • 9Kagal L, Finin T, Joshi A.A policy based approach to security for the semantic web[C]//Proceedings of the 2nd International Semantic Web Conference, ISWC 2003,2003 : 402-418.
  • 10Tonti G, Bradshaw J M, Jeffers R, et al.Semantic Web languages for policy representation and reasoning: A comparison of KAoS, Rei, and Ponder[C]//Proceedings of the 2rid International Semantic Web Conference, ISWC 2003,2003:419-437.

同被引文献32

  • 1Wang L Y, Wijesekera D,Jajodia S.A logic-based frame?work for attribute based access control[C].IProceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering.New York:ACM,2004:45-55.
  • 2Lang B, Foster I, Siebenlist F, et al.A flexible attribute based access control method for grid computing[J].Journal of Grid Computing, 2009, 7(2): 169-180.
  • 3Sloman M.Po1icy driven management for distribution sys?tems[J].Journal of Network and Systems Management, 1994, 2( 4): 336-360.
  • 4Moses T.eXtensible Access Control Markup Language (XACML) version 2.0[EB/OL]. (2005-02-01 ) .http r/zdocs.oasis-opcn.org/xacml/ 2. O/access _ control-xacml-2. O-core-spec-os. pdf.
  • 5Ye C, Zhong 1, Fen YAttribute-based access control policy specification language[J].Journal of Southeast University, 2008, 24(3): 206-263.
  • 6Priebe T, Dobmeier W, Schlager C, et al.Supporting attribute?based access control in authorization and authentication infra?structures with ontologies[J].Journal of Software, 2007 , 2 ( 1 ) : 27-38.
  • 7Barker S, Stuckey P I.Flexible access control policy specifi?cation with constraint logic programming[J].ACM Transac?tions on Information and System Security(TISSEC), 2003,6 (4) :501-546.
  • 8Zhao C, Liu S P, Lin Z Q .Representation and reasoning on RBAC: a description logic approach[C]//LNCS 3722: Pro?ceedings of the International Colloquium on Theoretical Aspects of Computing.Berlin: Springer- Verlag, 2005: 394-406.
  • 9Finin T,Joshi A, Kagal L, et aI.ROWLBAC: representing role based access control in OWL[C].IProceedings of 13th ACM Symposium on Access Control Models and Technol?ogies.New York: ACM Press ,2008: 73-82.
  • 10Beimel D, Peleg M.Using OWL and SWRL to represent and reason with situation-based access control policies[J]. Data & Knowledge Engineering, 201 I ,70: 595-615.

引证文献4

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部