期刊文献+

支持角色双向继承的约束RBAC模型

A CONSTRAINED RBAC MODEL SUPPORTING ROLE BIDIRECTIONAL INHERITANCE
下载PDF
导出
摘要 针对经典RBAC(Role Based Access Control)模型在复杂应用系统中操作繁琐以及难以映射组织结构等不足之处,提出了一种支持角色双向继承的约束RBAC模型BI-RBAC。该模型对经典的RBAC模型进行扩展,增加虚拟角色及其层次结构以支持角色的双向继承,并定义资源操作的概念。给出模型的形式化定义的同时,设计了访问控制算法。模型在自主开发的大型平台软件钱塘中间件平台软件中得到了应用,可较好地支撑恒生证券交易系统等大型软件系统。 For the inadequacies of classic RBAC model such as the cumbersome operation in complex application systems and the difficulty to map organisation structures,we propose a constrained RBAC model supporting role bidirectional inheritance,BI-RBAC.The model extends the classic RBAC model,adds virtual role and its hierarchy to support the role bidirectional inheritance,and define the concept of resource operation.While giving the formal definition of the model,the access control algorithm is designed as well.The model has been applied to the self-developed large-scale Jtang Middleware platform,and can well support the Hundsun stock exchange system and other large application systems.
作者 丁小明 邝砾
出处 《计算机应用与软件》 CSCD 2011年第6期121-124,共4页 Computer Applications and Software
基金 国家发展和改革委员会信息安全专项产品产业化专项(20062981)
关键词 访问控制 虚拟角色 虚拟角色层次结构 双向继承 Access control Virtual role Virtual role hierarchy Bidirectional inheritance
  • 相关文献

参考文献8

二级参考文献21

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2李帆,郑纬民.基于角色与组织的访问控制模型[J].计算机工程与设计,2005,26(8):2136-2140. 被引量:27
  • 3Ferraiolo D F,Cuginiand J,Kuhn D R.Role Based Access Control:Features and Motivations.In:Proc.of the 11th Annual Conf.on Computer Security Applications.1995
  • 4Sandhu R S,et al.Role-based Access Control:A Multi-Dimension View .In:Proc.of the 10th Annual Conf.on Computer Security Applications.1994
  • 5Sandhu R S,et al.Role-Based Access Control Models .IEEE Computer,1996,29(2):38~47
  • 6Sandhu R,et al.The ARBAC97 model for role-based administration of roles.ACM Transactions on Information and System Security,1999,2(1):105~ 135
  • 7Nyanchama M,Osborn S.The role graph model and conflict of interest.ACM Transactions on Information and System Security,1999,2(1):3~33
  • 8Ferraiolo D F, Sandhu R, Gavrila S. Proposed NIST standard for role-based access control[J]. ACM Transactions on Information and System Security, 2001,4(3):224-274.
  • 9David Ferraiolo, Richard Kuhn. Role-Based Access Control[EB/OL]. http:∥csrc.nist.gov/rbac/ferraiolo-kuhn-92.pdf.
  • 10Sandhu R S, Coyne E J, Feinstein H L, et al. Role-based access control models[J]. Computer, 1996,29(2):38-47.

共引文献53

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部