期刊文献+

基于语义的RBAC模型权限冲突检测方法 被引量:4

Detecting conflict of permissions in RBAC model with semantic approach
下载PDF
导出
摘要 RBAC模型通过角色将用户和权限进行了逻辑分离,然而在角色分配及权限授予时,导致的冲突检测没有得到彻底解决。提出了一种基于语义的RBAC模型冲突检测方法:利用描述逻辑作为逻辑框架构造知识库,对RBAC模型及其中的冲突关系进行了形式化的表示和推理,通过检测角色分配和权限授予过程中出现的用户角色冲突、角色权限冲突以及用户权限直接授予冲突关系,最终有效地检测出权限冲突,保证用户权限的一致性和正确性。 The RBAC(Role Based Access Control) model separates user with permission logically by introducing role,to make authorization process manageable.However,in the process of generating roles and permissions for authorization,the conflict detection problem has not been well resolved.A method for detecting permission conflicts in RBAC model based on semantic is proposed by adopting description logics to construct knowledge base,to represent RBAC model and reason the relationships of permissions and their conflicts.Thus conflicts of permissions can be detected effectively with reasoning in knowledge base by detecting conflicts when roles are assigned to user,permissions are assigned to role and permissions are assigned to user directly,to ensure consistency and correctness of user permission in RBAC model.
出处 《计算机工程与应用》 CSCD 北大核心 2011年第26期74-78,共5页 Computer Engineering and Applications
基金 国家自然科学基金No.60803027 国家高技术研究发展计划(863)No.2007AA01Z445 重庆市自然科学基金(No.CSTC.2008BB2312)~~
关键词 访问控制 描述逻辑 冲突检测 access control description logics conflict detection
  • 相关文献

参考文献12

  • 1邓集波,洪帆.基于任务的访问控制模型[J].软件学报,2003,14(1):76-82. 被引量:222
  • 2Sandhu R, Coyne E,Feinstein H, et al.Role-based access control model[J].IEEE Computer, 1996,29(2) : 38-47.
  • 3Fermiolo D,Sandhu R,Gavrila S,et al.Proposed NIST standard for role-based access control: towards a unified standard[J].ACM Transactions on Information and System Security, 2001,4(3): 224-274.
  • 4A-Kahtani M A, Sandhu R.Rule-based RBAC with negative authorization[C]//Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC' 04), December, 2004: 405-415.
  • 5Benferhat S, Baida R E, Cuppens EA Stratification-based Approach for Handling Conflicts in Access Control[C]//Proceedings of the 8th ACM Symposium on Access Control Models and Technologies (SACMAT' 03) ,Como,Italy, June, 2003 : 189-195.
  • 6Ji GaoFeng, Tang Yong, Jiang Yuncheng, et al.A description logic approach to represent and extend RBAC model[C]//Proceedings of the 1st hat Symposium on Pervasive Computing and Applica tions,2006:151-156.
  • 7Zhao C, Liu S P, Lin Z Q.Representation and Reasoning on RBAC: a description logic approach[C]//LNCS 3722: Proceed- ings of the International Colloquium on Theoretical Aspects of Computing.[S.l.] : Springer-Verlag, 2005:394-406.
  • 8孙小林,卢正鼎,李瑞轩,王治刚,陈新华.角色访问控制中基于描述逻辑的角色互斥实现[J].计算机工程与科学,2007,29(9):37-40. 被引量:2
  • 9于海波,车海燕,金淳兆.基于描述逻辑的RB-RBAC授权规则冲突检测方法[J].计算机科学,2006,33(10):101-105. 被引量:4
  • 10胡金柱,陈娟娟.RBAC模型中角色的继承与互斥问题的研究[J].计算机科学,2003,30(11):160-163. 被引量:5

二级参考文献32

  • 1Beznosov K. Engineering Access Control for Distributed Enterprise Applications[PhD Thesis]. Florida International University, Miami,FL. 2000:127.
  • 2Lampson B W. Protection. In Proceedings of the 5^th Annual Princeton Conference on Information Sciences and Systems, 1971.
  • 3Woo T, Lam S. Authorizations in Distributed Systems: A New Approach. Journal of Computer Security, 1993,2(2&3): 107-136.
  • 4Sandhu R, Ferraiolo D. The NIST Model for Role-based Access Control: Towards a Unified Standard. Berlin, Germany: In Proc. of the fifth ACM Workshop on Role-based Access Control,2000-07:47-63.
  • 5Li Dongdong, Hu Songlin, Bai Shuo. A Uniform Model for Authorization and Access Control in Enterprise Information Platform.EDCIS, 2002:180-192.
  • 6Borst W N. Construction of Engineering Ontologies for Knowledge Sharing and Reuse[PhD Thesis]. University of Twenter, Enschede,1997.
  • 7Yan Han,Liu Feng-Yu,Zhang Hong. An object-oriented model of access control based on role. ACM SIGSOFT SoftwareEngineering Notes, 2000,25 (2): 64~ 68
  • 8Sandhu R S,Coyne E J,Feinstein H L,et al. Role-based accesscontrol models [J]. IEEE Computer, 1996,29 (2): 38 ~ 47
  • 9Sandhu R,Ferraiolo D,Kuhn R . The NIST Model for Role-based Access Control : Towards A Unified Standard [A] . In: Proc. of 5th ACM2000. Workshop on Role-Based Access Control [C]. ACM, Berlin, Germany, July 2000
  • 10Simon R T, Zurko M E. Separation of Duty in Role-Based Environments. In : Proc. of Computer Security Foundations Workshop X, Rockport, Massachusetts, 1997

共引文献232

同被引文献18

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部