期刊文献+

“Chinese Wall”安全策略中的委托研究 被引量:2

Study on delegation with Chinese Wall security policy
下载PDF
导出
摘要 Chinese Wall下的委托要求委托过程不但满足常见的委托约束条件外,还需要满足Chinese Wall Security Policy(CWSP)。现有的委托模型很少关注CWSP下的委托。分析了CWSP下委托的需求和特殊性。在对现有委托模型扩充的基础上,定义了冲突角色和角色激活历史来体现CWSP,给出了CWSP下进行委托需要满足的关系。提出了基于角色的CWSP下委托的方法与步骤。给出了系统实现框架和主要算法。 Delegation with "Chinese Wall" must satisfy not only regular delegation constraints,but Chinese Wall Security Policy (CWSP) as well.Existing delegation models pay little attentions to this field.This paper analyzes requirements and specificities of delegation with CWSP.Based on the extension of existing delegation models, this paper defines conflict role and role activa- tion history to describe CWSP, and gives relations to restrict delegation with CWSP.Methods and steps of delegation are proposed with CWSP based on role.This paper proposes implementation architecture and some main algorithms.
出处 《计算机工程与应用》 CSCD 北大核心 2011年第29期121-123,167,共4页 Computer Engineering and Applications
基金 国家自然科学基金(the National Natural Science Foundation of China under Grant No.60803027) 重庆市自然科学基金(CSTC No.2008BB2320)
关键词 角色访问控制 委托 “中国墙”安全策略 role based access control delegation Chinese Wall Security Policy(CWSP)
  • 相关文献

参考文献5

  • 1Zhang Xinwen, Oh Sejong, Ravi S.PBDM: a flexible delegation model in RBAC[C]//Proc of the SACMAT' 03.Como, Italy: ACM Press,2003 : 149-157.
  • 2Barka E S.Framework for role-based delegation models[D].Fairfax,Virginia:George Mason University,2002.
  • 3Zhang Longhua,Ahn G J, Chu B T.A rule-based framework for role-based delegation[J].ACM Transactions on Information and System Security, TISSEC, 2003,6 (3) : 404-441.
  • 4叶春晓,吴中福,符云清,钟将,冯永.基于属性的扩展委托模型[J].计算机研究与发展,2006,43(6):1050-1057. 被引量:17
  • 5Brewer D F C,Nash M J.The Chinese wall security policy[C]// Proc of the IEEE Symposium on Security and Privacy.Oakland, Calif: IEEE Press, 1989 : 215-228.

二级参考文献11

  • 1Ravi Sandhu, Edward Coyne, Hal Feinstein, et al. Role-based access control models. IEEE Computer, 1996, 29(2):38-47
  • 2Xinwen Zhang, Sejong Oh, Ravi Sandhu. PBDM: A flexible delegation model in RBAC. In: Proc. SACMAT'03. New York:ACM Press, 2003
  • 3Roberto Tamassia, Danfeng Yao, William H, Winsborough.Role-based cascaded delegation. In: Proc. SACMAT'04. New York: ACM Press, 2004
  • 4Ezedin Barka, Ravi Sandhu. Framework for role-based delegation models. In: Proc. 16th Annual Computer Security Application Conference (ACSAC2000). Los Alamitos, CA: IEEE Computer Society Press, 2000
  • 5Ezedin Barks, Ravi Sandhu. A role-based delegation model and some extensions, The 23rd National Information Systems Security Conference (NISSC 2000), Baltimore, USA, 2000
  • 6Longhua Zhang, Gail-Joon Ahn, Bei-Tseng Chu. A rule-based framework for role based delegation. In: Proe, SACMAT' 01,New York: ACM Press, 2001
  • 7Ye Chunxiao, Fu Yunqing, Wu Zhongfu. An attribute-based-delegation-model, The 3rd Int'l Conf. Information Security,Shanghai, 2004
  • 8Ravi Sandhu, Qamar Munawer. A model for role administration using organization. In: Proc. SACMAT'02. New York: ACM Press, 2002
  • 9Cheh Goh, Adrian Baldwin. Towards a more complete model of role. In: Proc. RBAC'98. New York: ACM Press, 1998
  • 10Mohammad Abdullah AI-Kshtani. A family of models for rule-based user role assignment: [Ph. D. dissertation]. Fairfax, VA:George Mason University, 2003

共引文献16

同被引文献19

  • 1叶春晓,吴中福,符云清,钟将,冯永.基于属性的扩展委托模型[J].计算机研究与发展,2006,43(6):1050-1057. 被引量:17
  • 2刘晓玲,汤庸冀,高峰,易盛.基于TBAC的BPEL访问控制技术研究[J].计算机科学,2007,34(2):132-136. 被引量:2
  • 3李晓峰,冯登国,徐震.基于扩展XACML的策略管理[J].通信学报,2007,28(1):103-110. 被引量:10
  • 4李晓峰,冯登国,何永忠.XACML Admin中的策略预处理研究[J].计算机研究与发展,2007,44(5):729-736. 被引量:5
  • 5Paci F,Bertino E,Crampton J.An access control framework for WS-BPEL[J].Intemational Journal of Web Services Research, 2008,5(4) :20-43.
  • 6Rissanen E,Lockhart H,Moses T.XACML3.0 administrative policy[EB/OL]. ( 2009-04 ) [2012 -01 ].http ://www.oasis-open.org/ committees/tc-home.php?wg_abbrev=xacml.
  • 7OASIS.Extensible Access Control Markup Language(XACML) V3.0 [EB/OL]. (2009-04) [2012-01 ] .http ://docs.oasis-open.org/ xacml/3.0/xacml-3.0-core-spec-cd- 1-en.pdf.
  • 8Sandhu R S,Coyne E J,Feinstein H L,et al.Role-based access control models[J].IEEE Computer,1996,29(2):38-47.
  • 9Barka E S.Framework for role-based delegation models[D].Fairfax,Virginia:George Mason University,2002.
  • 10Zhang Longhua,Ahn G J,Chu B T.A rule-based framework for role-based delegation[J].ACM Transactions on Information and System Security,2003,6(3):404-441.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部