期刊文献+

基于互斥角色约束的静态职责分离策略 被引量:4

Static eparation of duty policy base on mutually exclusive role constraints
下载PDF
导出
摘要 静态职责分离(SSOD)是保证计算机安全的重要策略。在基于角色的权限控制(RBAC)中直接基于互斥角色约束(2-2 SMER)实现最简单的SSOD策略(2-n SSOD)是困难的。通过对互斥角色的权限分配进行约束,研究并证明了基于2-2 SMER实现2-n SSOD策略的充分条件,此充分条件和现有研究相比具有更弱的约束力,支持更灵活的权限分配。进一步给出了实现2-n SSOD策略的授权管理操作规则,以确保权限的动态管理始终满足此充分条件,维持系统对2-n SSOD策略的满足状态。最后,通过应用实例说明了实现2-n SSOD策略方法的有效性和可行性。 Static Separation Of Duty(SSOD) is an important principle of information system security.In Role-Based Access Control(RBAC),it is difficult to enforce 2-n SSOD policy directly based on 2-2 Static Mutually Exclusive Role(SMER) constraints.In this paper,the necessary and sufficient conditions of realizing 2-n SSOD policy based on 2-2 SMER constraints were proposed and proved.The sufficient condition proposed was less restrictive than the existing research and allowed more flexible privilege assignment.By the operation rules of authorization management,the sufficient condition was kept and the satisfaction of 2-n SSOD policy during the dynamic change of application environment could be maintained.The application example shows that the method is correct and effective.
出处 《计算机应用》 CSCD 北大核心 2011年第7期1884-1886,1890,共4页 journal of Computer Applications
基金 国家863计划项目(2006AA01Z4572009AA01Z438)
关键词 静态职责分离 互斥角色 授权管理 访问控制 Static Separation Of Duty(SSOD) mutual exclusive role authorization management access control
  • 相关文献

参考文献9

  • 1SIMON R,ZURKO M E. Separation of duty in role-based environments[C] // Proceedings of 10th Computer Security Foundations Workshop. Washington, DC:IEEE Computer Society, 1997:183-194.
  • 2ANSI INCITS 359-2004. American national standard for information technology-role based access control[S] ,2004.
  • 3LI NINGHUI, TRIPUNITARA M V, BIZRI Z. On mutually-exclusive roles and separation of duty[J]. ACM Transactions on Information and System Security, 2007, 10(2):42-51.
  • 4LI NINGHUI, WANG QIHUA. Beyond separation of duty: An algebra for specifying high-level security policies[J]. Journal of the ACM, 2008,55(3):1-4.
  • 5KUHN D R. Mutual exclusion of roles as a means of implementing separation of duty in role based access control systems[C] // Proceedings of 2nd ACM Workshop on Role-Based Access Control.New York:ACM, 1997: 23-30.
  • 6MOON C J, PARK D H, PARK S J, et al. Symmetric RBAC model that takes the separation of duty and role hierarchies into consideration [J]. Computers and Security,2004, 23(2):126-136.
  • 7MOON C J,, PAIK W J, KIM Y G, et al. The conflict detection between permission assignment constraints in role-based access control[C] // CISC 2005.Berlin:Springer,2005: 265-278.
  • 8AHN G J. Role-based authorization constraints specification [J]. ACM Transactions on Information and System Security, 2000, 3(4): 207-226.
  • 9CHEN HONG, LI NINGHUI. Constraint generation for separation of duty[C] // Proceedings of the 11th ACM Symposium on Access Control Models and Technologies. New York:ACM, 2006:130-138.

同被引文献29

  • 1胡金柱,陈娟娟.RBAC模型中角色的继承与互斥问题的研究[J].计算机科学,2003,30(11):160-163. 被引量:5
  • 2段隆振,文锋,黄水源,冯豫华.一种描述RBAC角色层次关系和互斥关系的模型及实现[J].南昌大学学报(理科版),2006,30(6):601-604. 被引量:4
  • 3孙小林,卢正鼎,李瑞轩,王治刚,陈新华.角色访问控制中基于描述逻辑的角色互斥实现[J].计算机工程与科学,2007,29(9):37-40. 被引量:2
  • 4卢昱,王宇,吴忠望.信息网络安全控制[M].北京:国防工业出版社,2011:15-17.
  • 5Feng Xiaosheng, Ge Bin, Sun Yang, et al. Broadband Network and Multimedia Technology ( IC - BNMT ) [ C ]//200 3rd IEEE International Conference on Digital Object Identifier.[ s. 1. ] : [ s. n. ] ,2010:677-683.
  • 6Habib M A. 2010 International Conference on Intemet Tech- nology and Secured Transactions (ICITST) [ C]. [ s. 1. ] : [ s. n. ] ,2010:1-6.
  • 7Li Ninghui, Wang Qihua. Beyond separation of duty : An alge- bra for specifying high-level security policies [ J]. Journal of the ACM,2008,55(3) :1-4.
  • 8Sandhu R, Coyne E, Feinstein H, et al. Role-based Access Control Model [ J ]. IEEE Computer, 1996,29 ( 2 ) :38-47.
  • 9鲁剑峰.访问控制策略的安全与效用优化方法研究[D].武汉:华中科技大学,2010.
  • 10MAX P, LI R X, LU Z D, et al. Specifying and enforcing the princi- ple of least privilege in role-based access control[ J]. Concurrency and Computation: Practice and Experience, 2011, 23 (12) : 1313 - 1331.

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部