期刊文献+

企业级信息系统的访问控制研究与应用 被引量:2

Research and Application of Access Control of Enterprise Information System
下载PDF
导出
摘要 针对企业级信息系统用户、角色多,权限关系和客体资源复杂等特点,在分析了多种访问控制技术的基础上,提出了一种新的基于角色的访问控制模型及其安全策略。此模型对传统的RBAC模型进行了优化处理,将分级授权、最小化授权、角色授权继承等策略相结合,以支持多种细粒度的访问控制。实验证明,能提高企业级信息系统的安全性和运行效率。 For many users and roles of enterprise information system, permissions and complex object resources, based on the analysis of a variety of access control technologies, a new role-based access control model and its security policy are come UP. The traditional RBAC model is optimized by this model, and rating authorization, minimize authorization and role authorization inheritance are combined to support a variety of fine-grained access control. Experiments proved that it can improve the safety and operating efficiency of the enterprise information systems.
出处 《价值工程》 2012年第5期149-150,共2页 Value Engineering
基金 2010年江苏省高等学校大学生实践创新训练计划基金支持项目
关键词 企业级信息系统 访问控制模型 角色 安全策略 enterprise information system access control model role security policy
  • 相关文献

参考文献4

  • 1Sandhu RS, Coyne EJ, Feinstein HL, et al Models[J].IEEE Computer, 1996, 29(2):38-47.
  • 2Ferraiolo D, Barkely J, Kuhn R. A Role-based Access Control Model and Reference Implementation Within a Corporate Intranet [J]. ACM Transaetions on Information and System Security, 1999,2(1): 34-64.
  • 3Axel Kern, Martin Kuhlmann, et al. A Meta Model for Authorizations in Application Seeurity Systems and Their Integration into RBAC Administration [DB/OL].http://portal.acm.org, 2004-06-24,2005-06-10.
  • 4钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91

二级参考文献5

  • 11,Ferraiolo D F, Kuhn R. Role-Based access control. In: Proceedings of the 15th National Computer Security Conference. Baltimore, MD, 1992. 554~563, http://hissa.ncsl.nist.gov/kuhn/
  • 22,Sandhu R, Samarati P. Access control: principles and practice. IEEE Communications, 1994,32(9):40~48
  • 33,Ramaswamy C, Sandhu R. Role-Based access control features in commercial database management systems. In: Proceedings of the 21st National Information Systems Security Conference. Virginia: U.S. Government Printing Office, 1998, http://www.list.gmu.edu/conferen.htm
  • 44,Sandhu R, Coyne E J, Feinstein H L et al. Role-Based access control models. IEEE Computers, 1996,29(2):38~47
  • 55 Sandhu R. Rationale for the RBAC96 family of access control models. In: Proceedings of the 1st ACM Workshop on Role-Based Access Control. ACM, 1997. http://www.list.gmu.edu/conferen.htm

共引文献90

同被引文献21

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部