期刊文献+

一种基于RBAC的多域间角色映射机制 被引量:3

A Role Mapping Mechanism for RBAC-Based Multi-Domains
原文传递
导出
摘要 针对基于角色的访问控制(RBAC)的多域系统,提出了一套安全而高效的满足策略合成与冲突解决要求的角色映射机制。通过引入对等权限概念,明确了策略合成的目标;支持了基于混合角色层次的RBAC系统上的多域间策略合成;提出了权限非上升原则和角色映射的3个属性来使得角色映射细粒度化,同时获得安全的全局策略。所提出的算法在策略合成过程中,自动检测和避免了策略冲突,合成算法的复杂度低,便于实际应用。 For RBAC-based multi-domain systems, a reliable static role mapping mechanism that integrates multidomain policies without any constraint conflict is presented. By introduction of the equivalent permission concept, the goal of policy integration is defined, and the hybrid hierarchy is supported in this integration mechanism. The principle of non-rising permission and the role mapping attributes are proposed in order to achieve fine granulation and secure global policies. Due to the low algorithm complexity, this algorithm could be easily applied in practical scenarios.
作者 周鑫 潘理
出处 《信息安全与通信保密》 2012年第5期78-80,83,共4页 Information Security and Communications Privacy
基金 国家自然科学基金资助项目(批准号:60903191) 信息网络安全公安部重点实验室开放课题
关键词 RBAC模型 角色映射 继承环 SOD约束 策略合成 RBAC model role mapping cyclic inheritance SOD constraint policy integration
  • 相关文献

参考文献11

  • 1GONG Li, QIAN Xiaolei. Computational Issues in Secure Interoperation[]]. IEEE Transactions on Software Engineering, 1996, 22(1): 43-52.
  • 2何长龙,李伟平,贺建忠,魏明欣.基于策略的RBAC统一授权模型研究[J].信息安全与通信保密,2010,7(6):77-81. 被引量:4
  • 3李敏,高悦翔.动态角色访问控制模型的研究与应用[J].通信技术,2009,42(5):221-223. 被引量:5
  • 4GEETHAKUMARI G, NEGI A, SASTRY D. A Cross-domain Role Mapping and Authorization Framework for RBAC in Grid Systems[J]. International Journal of Computer Science and Applications, 2009, 6(1): 1-12.
  • 5KAMATH A, LISCANO R, SADDIK A. User-credential based Role Mapping in Multi-domain Environment[C]// International Conference on Privacy, Security and Trust. New York: ACM, 2006.
  • 6WICKRAMAARACHCHI G, QARDAJI W, LI Ninghui. An Efficient Framework for User Authorization Queries in Rbac Systems[C]//Proceedings of the 14'h ACM Symposium on Access Control Models and Technologies. New York: ACM, 2009: 23-32.
  • 7SHAFIQ B, JOSHI J, BERTINO E, et al. Secure Interoperation in a Multi-domain Environment Employing RBAC Policies[J]. IEEE Transactions on Knowledge and Data Engineering, 2005, 17(11): 1557-1577.
  • 8SANDHU R. Role Activation Hierarchies[C]//Proceedings of the Third ACM Workshop on Role-based Access Control. NewYork: ACM, 1998: 33-40.
  • 9谷和武,潘理.基于RBAC的多域策略冲突及其检测方法[J].信息安全与通信保密,2010,7(6):84-86. 被引量:1
  • 10张帅,陈晓辉,侯桂云.基于团队和任务的RBAC访问控制模型[J].通信技术,2009,42(11):119-120. 被引量:1

二级参考文献25

  • 1姚春华,江泓.基于角色的动态访问控制在SNMPv3中的应用[J].通信技术,2008,41(5):99-102. 被引量:1
  • 2肖南飞,洪帆,姜小娟.动态访问控制及其应用[J].通信技术,2003,36(5):68-70. 被引量:1
  • 3刘婷婷,汪惠芬,张友良.支持授权的基于角色的访问控制模型及实现[J].计算机辅助设计与图形学学报,2004,16(4):414-419. 被引量:9
  • 4朱虹,雷洁.基于角色的语义相关XML访问控制模型[J].信息安全与通信保密,2006,28(9):128-130. 被引量:1
  • 5Sandhu R S, Coyne E J. Role based access control models[J]. IEEE Computer, 1996, 29 (2):38-47.
  • 6Sandhu R S, Coyne E J, Feinstein H L, et al. Role-Based Access Control Models[J]. IEEE Computer, 1996, 29(02):38- 47.
  • 7Ferraiolo D F, Sandhu R,Gavrila S, et al. Proposed NIST Standard for Role-based Access Control[J]. ACM Transactions on Information and System Security, 2001, 4(03):224-2?4.
  • 8Sandhu R S, Bhamidipati V, Munawer Q. The ARBAC97 model for role-based administration of roles[J]. ACM Trans. 1999,2(01): 105-135.
  • 9Sandhu R S,Coyne E J,Feinstein H L,et al.Role-based Access Control Models[J].IEEE Computer,1996,29(02):38-47.
  • 10Al-Kahtani M,Sandhu R S.A Model for Attribute-Based User-Role Assignment[C]//Proceed-ings of the 18th Annual Computer Security Applications Conference,[s.l.]:IEEE,2002:353-362.

共引文献13

同被引文献21

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部