期刊文献+

基于角色访问控制的权限管理系统改进与应用 被引量:1

Inheritance Improvement and Application of Access Control System Based on RBAC
下载PDF
导出
摘要 对基于角色的访问控制模型进行了研究,对传统访问控制模型、基于角色的访问控制(RBAC)模型、角色管理模型ARBAC97进行了描述和分析。对RBAC模型进行范围扩展,通过引入角色范围的概念,以(用户,角色,范围)三元组来标识系统用户的权限,解决RBAC模型无法对资源实例进行权限控制的问题,也就是解决了系统用户拥有相同的角色,操作的数据范围可以不同。结合实际应用系统的需求,实现了权限管理系统。 Researching the role-based access control model, description and analysis on the traditional access control models, RBAC models, role based management model. Study and analyze the range extensions of the role-based access control (RBAC) model, by introducing the range of roles, use the (user, role, range) ternary array to identify the user's permissions, solving the insolvable problem by RBAC model that it cannot control the instance of resource, meantime the system users have the same role, the operating range of data can be different.The model is applied to the desi~,nin~ and development of the real business need.
作者 李剑
机构地区 湖北工业大学
出处 《科技信息》 2011年第13期112-113,170,共3页 Science & Technology Information
关键词 访问控制 权限管理 基于角色的访问控制 安全 权限模型 Access control Permission management RBAC Security Permission modle
  • 相关文献

参考文献1

二级参考文献11

  • 1Gladney H.M., Meyers J.J., Worley E.L. Access control mechanism for computing resources. IBM Systems Journal, 1975, 14(3): 212~228
  • 2Anderson J.P. Computer security technology planning study. Air Force Electronic Systems Division, Hanscom AFB, Bedford, MA: Technical Report ESDTR-73-51, 1972
  • 3Xu Feng, Xie Jun, Huang Hao, Xie Li. Context-aware role-based access control model for Web services. Lecture Notes in Computer Science 3252, 2004, 430~436
  • 4Ferraiolo David, Kuhn Richard. Role-based access controls. In: Proceedings of the 15th NIST-NCSC National Computer Security Conference, Baltimore, MD, 1992, 554~563
  • 5Sandhu R., Conyne E.J., Lfeinstein H.L. et al. Role based access control models. IEEE Computer, 1996, 29(2): 38~47
  • 6Ferraiolo D.F., Sandhu R., Guirila S., Kuhn D.R., Chandramouli R. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 2001, 4(3): 224~274
  • 7Xu Feng, Lin Guo-Yuan, Huang Hao, Xie Li. Role-based access control system for Web services. In: Proceedings of the 4th International Conference on Computer and Information Technology (CIT'04), Wuhan, 2004, 357~362
  • 8Thomas R.K., Sandhu R. Task-based authentication controls (TABC): A family of models for active and enterprise-oriented authentication management. In: Proceedings of the IFIP WG11.3 Workshop on Database Security, London, 1997, 166~181
  • 9Sudhir Agarwal, Barbara Sprick. Access control for semantic Web services. In: Proceedings of IEEE International Conference on Web Services (ICWS'04), San Diego, California,USA, 2004, 770~773
  • 10Bhatti R., Joshi J.B.D., Bertino E., Ghafoor A. Access control in dynamic XML-based Web-services with XRBAC. In: Proceedings of the 1st International Conference on Web Services, Las Vegas, 2003, 243~249

共引文献55

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部