期刊文献+

基于属性RBAC及委托性质的使用控制模型 被引量:2

Model of Attribute-RBAC with Character of Delegation Usage Control
下载PDF
导出
摘要 针对UCON未涉及特权委托的基本特征和权限管理的缺陷,提出了基于属性RBAC的带委托性质的使用控制模型(EUCON).将角色、委托和扩展属性等要素引入到EUCON,构建了基于属性-角色的访问控制方法,提高了模型的可变性和动态性,并使用区间时序逻辑对该委托模型的完备性进行逻辑验证,最后提供了网上行政审批的实例,为模型的应用奠定了一个很好的实例基础. As UCON model does not involve the, basic characteristics of the delegation and the usage of permissions is not wcll-manage,mcnt, a new model base, d on attribute- RBAC with character of dele,gation usage control is proposed. Key elemcnts sueh as role, delegation and extendeed-attributc into usage control are, introduced. A new access control method that based on attribute-role, which makes the model more, variably and dynamically is prcsented. In addition, Interval Temporal Logic is used for logically demonstrating the completeness of EUCON model based on delegation. Finally, an application of administrative, examination and approval is articulated, offering a good example for application of EUCON.
出处 《汕头大学学报(自然科学版)》 2010年第4期57-65,共9页 Journal of Shantou University:Natural Science Edition
基金 国家自然科学基金-国家杰出青年科学基金项目(60625101) 广东省部产学研合作引导项目(2009B090300345) 广东省现代信息服务业发展专项(GDIID2008IS046)
关键词 EUCON UCON RBAC 委托 区间时序逻辑 网上行政审批 EUCON UCON RBAC delegation interval temporal logic administrative examination and approval
  • 相关文献

参考文献11

  • 1Park J, Sandhu R. Towards usage control models: beyond traditional access control[C]//proc of the 71h ACM Symposium on Access Contrnl Models and Tcehnologies. California: ACM Press, 2002: 57-64.
  • 2Park J, Sandhu R. The UCONADC usage control model[J]. ACM Trans on Information and System Security, 2004, 7(1): 128-174.
  • 3Zhau Baoxian, Ravi Sandhu, Zhang Xinwen, et al. Toward: a times-based usage control model[J]. DBSee, 2007: 227-242.
  • 4Yang Ran, I,in Chuang, Feng FuJian. A time and mutahle, attribute-based access control model[J]. Journal of Computers, 2009, 6(4). 510-518.
  • 5Zhang Zhiyong, Yang Lin, Pet Qingqi, et al. Research on usage control model with delegation characteristics based on OM-AM methodology[C]//Proceedings of IFIP International Conference on Network and Parallel Computing-Workshop on Networks System Security. Washington D C: IEEE Conputer society, 2007: 238-243.
  • 6Zhang Xinwcn, Park J, Sandhu R. A logical specilication for usage contml [C] //Proceedings of the 9th ACM Symposium on Access Control Models and Te, chnologies. New York: ACM Press, 2004 : 67-75.
  • 7田光辉,吴江,张德同,秦宝生.基于动态描述逻辑的UCON授权模型[J].计算机工程,2008,34(19):163-166. 被引量:4
  • 8Sandhu R, Coyne E, Feinstein H, et al. Role-based access control models[J]. IEEE Computer, 1996, 29(2): 38-47.
  • 9Antonio Cau, Ben Moszkowski. Interval temporal logic, HTML version of the ITL home ,page [EB/OL]. http://www.csc.dmu.ac.uk/STRL/ITL/, 2009-05-15.
  • 10Alien J F, Ferguson G. Actions and events in interval tem-oral logic[J]. Journal Logic and Computation, 1994, 4(5): 531-579.

二级参考文献5

  • 1史忠植,董明楷,蒋运承,张海俊.语义Web的逻辑基础[J].中国科学(E辑),2004,34(10):1123-1138. 被引量:71
  • 2Park J, Sandhu R. A Unified Framework For Next Generation Access Control[D]. Fairfax County, USA: George Mason University, 2006.
  • 3Zhang Xinwen, Sandhu R, Park J, et al. Formal Model and Policy Specification of Usage Control[J]. ACM Trans. on Information and SYStem Security, 2005, 8(4): 351-387.
  • 4Park J. The UCONABC Usage Control Model[J]. ACM Trans. on Information and System Security, 2004, 7(1): 1-47.
  • 5Park J, Sandhu R. Towards Usage Control Models Beyond Traditional Access Control[C]//Proc. of the 7th ACM Symposium on Access Control Models and Technologies. [S. l.]: ACM Press, 2002.

共引文献3

同被引文献15

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部