期刊文献+

一个环境适应的基于角色的访问控制模型 被引量:14

An Environment-Adaptive Role-Based Access Control Model
下载PDF
导出
摘要 大型网络应用如疫情报告系统需要访问控制系统根据环境变化调整访问控制策略,而现有的访问控制模型缺乏灵活性,难以适应环境动态变化的需要.通过对RBAC模型进行扩展,提出了一个环境适应的基于角色的访问控制模型EA-RBAC.该模型相对于传统RBAC模型,增加了事件触发、基于事件的状态等价类迁移、环境角色和虚拟域等机制.通过事件触发机制和状态等价类迁移实现了系统对环境变化的感知和随环境变化的状态迁移.通过环境角色和虚拟域的概念,实现了环境角色的动态调整和用户授权的按状态调整.该模型能够根据环境变化,在不失安全性的前提下为大型网络应用灵活实施访问控制策略.作为示例,给出了模型在疫情报告系统中的适用性分析. Large scale network-based applications,such as infectious diseases reporting system,require that access control policy can be changed according to environment alternation.However,existing access control models are inflexible and can not be adapted to environment alternation because they are lack of mechanisms to capture environment alternation and to change access control policy.In this paper,we analyze the access control requirements of infectious diseases reporting system.Based on the analysis,we extract the general access control requirements of large scale network-based applications.Through extending RBAC model,we design the components of the environment-adaptive role-based access control model called EA-RBAC and give the formal definition of the model.Compared with traditional RBAC models,EA-RBAC model adds event-trigger,event-based equivalent states transition,environment role and virtual domain mechanisms.Through event-trigger and equivalent states transition,the system can perceive environment alternation and transit state based on environment alternation.Through environment role and virtual domains,the system can dynamically adjust environment role and user authorization based on current state.EA-RBAC model can enforce flexible access control policy for large scale network-based applications while holds security.Also,as an example,this paper gives the applicability analysis of EA-RBAC model in infectious disease reporting system.
出处 《计算机研究与发展》 EI CSCD 北大核心 2011年第6期983-990,共8页 Journal of Computer Research and Development
基金 国家自然科学基金项目(90818012) 国家“八六三”高技术研究发展计划基金重点项目(2007AA010601) 中国科学院重要方向项目(KGCX2-YW-125)
关键词 访问控制 环境适应 RBAC 环境角色 虚拟域 access control environment-adaptive RBAC environment role virtual domain
  • 相关文献

参考文献12

  • 1Sandhu R, Coyne E, Feinstein H, et al. Role-based access control models [J]. IEEE Computer, 1996, 29(2): 38-47.
  • 2Sandhu R, Munawer Q. The ARBAC99 model for administration of roles [C] //Proc of the 15th Annual Computer Security Applications Conference, Los Alamitos, CA: IEEE Computer Society, 1999:229-314.
  • 3Covington M J, Long Wende, Srinivasan S, et at. Securing context-aware applications using environment roles [C]// Proc of the 6th ACM Syrup on Access Control Models and Technologies. New York: ACM, 2001:10-20.
  • 4Bertino E, Catania B, Damiani M L, et al. GEO-RBAC: A spatially aware RBAC [C]//Proc of the 10th ACM Syrup on Access Control Models and Technologies. New York: ACM, 2005:29-37.
  • 5Bertino E, Bonatti P A, Ferrari E. TRBAC: A temporal role-based access control model[J]. ACM Trans on Information and System Security, 2001, 4(3): 191-233.
  • 6董光宇,卿斯汉,刘克龙.带时间特性的角色授权约束[J].软件学报,2002,13(8):1521-1527. 被引量:51
  • 7黄建,卿斯汉,温红子.带时间特性的角色访问控制[J].软件学报,2003,14(11):1944-1954. 被引量:72
  • 8Ray I, Yu Lijun. Towards a location-aware role-based access control model [C]//Proc of the 1st Int Conf on Security and Privacy for Emerging Areas in Communications Networks. Piscataway, NJ: IEEE, 2005:234-236.
  • 9张宏,贺也平,石志国.一个支持空间上下文的访问控制形式模型[J].中国科学(E辑),2007,37(2):254-271. 被引量:21
  • 10Cuppens F, Midge A. Modelling contexts in the Or-BAC model [C]//Proc of the 19th Annual Computer Security Applications Conference. Piseataway, NJ: IEEE, 2003: 416-425.

二级参考文献55

  • 1叶春晓,吴中福,符云清,钟将,冯永.基于属性的扩展委托模型[J].计算机研究与发展,2006,43(6):1050-1057. 被引量:17
  • 2[1]Sandhu, R. Issues in RBAC . In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 21~24.
  • 3[2]Jaeger, T. On the increasing importance of constraints. In: Proceedings of 4th ACM Workshop on Role-Based Access Control. Fairefax, VA: ACM Press, 1999. 33~42.
  • 4[3]Ahn, G.-J. The RCL2000 language for specifying role-based authorization constraints [Ph.D. Thesis]. Fairfax, VA: George Mason University, 1999.
  • 5[4]Sandhu, R., Coyne, E.J., Feinstein, H.L., et al. Role-Based access control models. IEEE Computer, 1995,29(2):38~47.
  • 6[5]Chen, Fang, Sandhu, R. Constraints for role-based access control. In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 39~46.
  • 7Ferraiolo DF, Sandhu R, Gavrila S. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 2001,4(3):224-274.
  • 8Osbom S, Sandhu R. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, 2000,3(2):85-106.
  • 9AHN G-J, Sandhu R. Role-Based authorization constraints specification. ACM Transactions on Information and System Security, 2000,3(4):207-226.
  • 10Sandhu R. Issues in RBAC. In: Youman C, Sandhu R, Coyne E, eds. Proceedings of the 1st ACM Workshop on Role-based access control. ACM Press, 1996. 21-24.

共引文献130

同被引文献157

引证文献14

二级引证文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部