期刊文献+

历史信息约束的角色访问控制模型

A RBAC Model Based with History Information Constraint
原文传递
导出
摘要 本文分析了约束RBAC中两种授权约束机制——SSD和DSD,指出它们无记忆性的不足,提出了将有限状态机与RBAC模型结合起来,构成一种新型的FSM_RBAC模型,最后通过示例讨论了该模型的应用。 In this paper,the SSD and DSD of constrained RBAC are analyzed,and their disadvantage of memoryless is pointed out.A new FSM_RBAC model,which is the combination of finite state machine and RBAC model,is presented,and its application is discussed through an example.
作者 庞平
出处 《网络安全技术与应用》 2011年第9期49-51,共3页 Network Security Technology & Application
关键词 有限状态机 约束 角色 历史信息 finite state machine constraint role historical information
  • 相关文献

参考文献5

二级参考文献21

  • 1王小明,赵宗涛.基于角色的时态对象存取控制模型[J].电子学报,2005,33(9):1634-1638. 被引量:18
  • 2徐洪学,郭秀英,刘永贤.基于RBAC的具有时空约束的工作流授权模型[J].东北大学学报(自然科学版),2006,27(2):217-220. 被引量:6
  • 3Sandhu R S,Coyne E J,Feinstein H L,et al.Role-based access control models[J].Computer, 1996,29(2) : 38-47.
  • 4Bertino E,Bonatti P A,Ferrari E.TRBAC:a temporal role-based access control model[J].ACM Transactions on Information and System Security, 2001,4 ( 3 ) : 191-223.
  • 5Damiani M L,Bertino E,Catania B,et al.GEO-RBAC:a spatially aware RBAC[C]//Proc of the Tenth ACM Symposium on Access Control Models and Technologies,Stockholm,Sweden,2005:29-37.
  • 6Chae S H,Kim W,Kim D K.uT-RBAC:ubiquitous role-based access control model[J].Information and Communication Engineers,2006, E89-A( 1 ) : 238-239.
  • 7Fu S,Xu C Z.A coordinated spatio-temporal access control model for mobile computing in coalition environments[C]//Proc of the 19th IEEE International Parallel and Distributed Processing Symposium, Denver, CA, 2005.
  • 8Li N H,Bizri Z,Tripunitara M V.On mutually-exclusive roles and separation of duty[C]//Proc of the 11th ACM Conference on Computer and Communications Security.Washington DC,New York: ACM Press,2004:42-51.
  • 9Ferraiolo DF, Sandhu R, Gavrila S. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 2001,4(3):224-274.
  • 10Osbom S, Sandhu R. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, 2000,3(2):85-106.

共引文献79

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部