期刊文献+

云环境下RBAC模型的改进及应用 被引量:1

The improvements and applications based on the RBAC model in cloud platform
下载PDF
导出
摘要 随着云计算平台在互联网的广泛应用,基于角色访问控制RBAC模型的问题也逐渐暴露出来.提出Cloud-RBAC模型,在传统RBAC模型中引入时间性约束参数,并增加了时效函数CloudDA、角色租赁函数CloudTA、权限租赁函数CloudTB,解决了RBAC模型中时效性问题和权限、角色转授问题. With cloud computing widely used in the Internet,problems in role-based access control or RBAC model are gradually exposed.In this paper,Cloud-RBAC model not only adds in the traditional RBAC model temporal constraint parameter,but also adds time effect function CloudDA,role of leasing function CloudTA and permissions lease function CloudTB.It solves the problems about timeliness,permissions and the role delegated in the RBAC model.
作者 周鸿旋
出处 《闽江学院学报》 2012年第5期94-96,共3页 Journal of Minjiang University
关键词 云平台 RBAC 时效性 cloud platform RBAC timeliness
  • 相关文献

参考文献7

  • 1马丽,马世龙,眭跃飞,伊胜伟.一种RBAC的描述逻辑表示方法[J].计算机科学,2010,37(3):29-35. 被引量:8
  • 2傅丰,洪源.RBAC访问控制技术的研究与应用[J].河南科技学院学报(自然科学版),2011,39(4):73-77. 被引量:5
  • 3Ranger C, Raghuraman R, Penmetsa A, et al. Evaluating mapReduce for multi-core and multiprocessor systems[ C].Proc of the 13th Int'l Symp on High-Performance Computer Architecture. Los Alamitos: IEEE Computer Society ,2007 :13 -24.
  • 4陆伟锋.基于组织机构图的改进RBAC模型[M].北京:高等教育出版社,2006.
  • 5Amazon. Amazon elastic compute cloud ( Amazon EC2 ) [ EB/OL]. ( 2009 - 12 - 19) [ 2012 - 05 - 23 ]. http ://aws. amazon, corn/ ec2/.
  • 6Aguilera M K, Merchant A, Shah M, et M. Sinfonia: a new paradigm for building scalable distributed systems[ C].Proc of the 21st ACM Syrup on Operating Systems Principles. New York: ACM Press ,2007 :159 - 174.
  • 7IBM. IBM virtualization [ EB/OL]. (2012 - 12 - 30) [ 2012 - 05 - 33 ]. http ://www. ibm. com/virtualization.

二级参考文献15

  • 1叶春晓,符云清,吴中福.RBAC中权限扩展的实现[J].计算机工程,2005,31(9):141-142. 被引量:27
  • 2林琳,詹永照,年轶.基于组织机构图的改进RBAC模型[J].江苏大学学报(自然科学版),2006,27(2):147-150. 被引量:5
  • 3向阳,魏玉鹏,王改梅.数据库访问控制技术研究[J].河南科技学院学报,2006,34(2):101-104. 被引量:2
  • 4Sandhu R, Coyne E, Feinstein H, et al. Role-based access control models[J]. IEEE computer, 1996,29 (2) : 38-47.
  • 5Ferraiolo D, Sandhu R, Gavrila S, et al. Proposed NIST standard for role-based access control[J]. ACM Transactions on Information and System Security, 2001,4(3):224-274.
  • 6ANSI INCITS 359-2004. Role Based Access Control[S]. American National Standards Institute, 2004.
  • 7Osbom S, Sandhu R, Munawer Q. Configuring role-based access control to enforce mandatory and discretionary access control policies[J]. ACM Transactions on Information and System Security (TISSEC), 2000,3 (2) : 85-106.
  • 8Li N,Byun J W,Bertino E. A critique of the ANSI standard on role-based access control[J]. IEEE Security and Privacy, 2007,5 (6) :41-49.
  • 9Ferraiolo D,Kuhn R, Sandhu R. RBAC standard rationale:Comments on "A critique of the ANSI standard on role-based access control"[J]. IEEE Security and Privacy, 2007,5 (6) : 51-53.
  • 10Koch M, Mancini L V, Parisi-Presicce F. A graph-based formali - sm for RBAC[J]. ACM Transactions on Information and System Security,2002,5(3) :332-365.

共引文献10

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部