期刊文献+

继承和优先约束驱动的柔性授权机制研究

Research on Flexible Authorization Mechanism Driven by Inheritance and Priority Constraint
下载PDF
导出
摘要 针对权限系统中存在角色授权策略单一和授权冲突的问题,设计IPC_URBAC模型,在RBAC模型的基础上增加继承约束的用户直接授权机制和优先约束的用户角色分配机制,提出基于个体和优先的授权冲突解决策略,并给出用户权限和角色权限的求解算法。运用IPC_URBAC,构造二进制授权掩码进行复杂权限设置,应用Web Service完成细粒度权限检查,达到权限与业务的剥离,实现一种与业务无关的柔性授权系统。 In view of drawbacks of current permission systems and role authorization, this paper designs IPC_URBAC model, adds user direct authorization mechanism based on user inheritance constraint and user role assignment mechanism based on priority constraint, puts forward authorization conflict resolution strategy based on individual and priority, and gives algorithms for solving the set of privileges belonged to a user and a role. It uses IPC_URBAC model, designs binary authorization mask to resolve setting problem of complex permission, and separates permission controls from concrete business by using Web service to complete the fine-grained permissions check, realizes a flexible authorization system having nothing to do with business.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第24期119-121,124,共4页 Computer Engineering
基金 山东省自然科学基金资助项目(ZR2009GM009) 山东省科技攻关计划基金资助项目(2009GG10001014)
关键词 角色 继承和优先约束 柔性授权 授权冲突 权限掩码 role inheritance and priority constraint flexible authorization authorization conflict permission mask
  • 相关文献

参考文献5

  • 1Ferraiolo D F, Barkley J F, Kuhn D R. A Role-based Access Control Model and Reference Implementation Within a Corporate lntranet[J]. ACM Trans. on Information and System Security, 1999, 2(1): 34-64.
  • 2Ahn G J, Sandhu R. Role-based Authorization Constraints Specification[J]. ACM Trans. on Information and System Security, 2000, 3(4): 207-226.
  • 3单徐梅,虞慧群.基于RBAC的工作流管理系统授权约束方法[J].计算机工程,2010,36(4):152-154. 被引量:7
  • 4Cuppens F, Cuppens-Boulahia'N, Ghorbel M B. High Level Conflict Management Strategies in Advanced Access Control Models[J]. Electronic Notes in Theoretical Computer Science, 2007, 186: 3-26.
  • 5蔡昭权.基于业务无关的权限管理的设计与实现[J].计算机工程,2008,34(9):183-185. 被引量:14

二级参考文献10

  • 1罗力华,姜建国.网站后台管理系统的用户权限管理的一种实现方案[J].电子科技,2006,19(10):62-67. 被引量:15
  • 2苏朋程,曹斌.一种分级权限管理方案的实现[J].信息技术与信息化,2006(5):59-61. 被引量:2
  • 3Sandhu R S. Role-based Access Control Models[J]. IEEE Computer, 1996, 29(2): 38-47.
  • 4Bertino E, Ferrari E, Atluri V. The Specification and Enforcement of Authorization Constraints in Workflow Management Systems[J]. ACM Transactions on Information and System Security, 1999, 2(1): 65-104.
  • 5Crampton J. A Reference Monitor for Workflow Systems with Constrained Task Execution[C]//Proceedings of the 10th ACM Symposium on Access Control Models and Technologies. New York, USA: ACM Press, 2005: 38-47.
  • 6Wolter C, Schaad A, Meinel C. Task-based Entailment Constraints for Basic Workflow Patterns[C]//Proc. of SACMAT'08. Estes Park, Colorado, USA: [s. n.], 2008: 52-58.
  • 7Perez F S. Datalog Educational System V 1.1 User's Manual[EB/OL]. (2004-10-23). http://www.fdi.ucm.es/profesor/fernan/DES/.
  • 8Sandhu R.Role-based Access Control Models[J].Computer,1996,29(2):38-47.
  • 9Ferraiolo D F,Barkley J F,Kuhn D R.A Role-based Access Control Model and Reference Implementation Within a Corporate Intranet[J].ACM Transactions on Information and System Security,1999,2(1):34-64.
  • 10施景超,孙维祥,许满武.基于角色的存取控制及其实现[J].计算机应用研究,2000,17(6):13-15. 被引量:48

共引文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部