期刊文献+

扩展的RBAC权限管理模型的设计与研究 被引量:6

Design and research of extended model based on RBAC
下载PDF
导出
摘要 对传统RBAC访问控制模型进行扩展,提出了基于导航树页面的RBAC模型,有效避免了传统RBAC模型应用到B/S系统时的角色和权限冗余。根据大多数电子政务系统对用户与角色数据的读取操作较更新操作频繁的特点,选择LDAP技术存储用户与角色数据,并且完成了数据存储设计。根据XML文件的存储功能以及动态加载导航树控件的特点,实现了基于XML文件权限访问策略的设计。此扩展模型是一种通用的动态加载导航树页面访问控制模型,为开发与设计此类用户访问控制模型的人提供借鉴。 This author extends the traditional RBAC access control model and proposes the RBAC model based on the navigation tree page witch effectively avoid the roles and permissions redundant when traditional RBAC model applied to the B/S system. According to the read operation of most E-government systems on the users and roles data is frequently than the update operation, the author select the LDAP service to store user and role data, and completed the design of data storage. Based on the XML file storage function, as well as the characteristic of dynamic loading navigation tree control, this paper realized the permissions access policy design based on XML file. This extended model is a general access control model is used to dynamic loading navigation tree page, provides a reference to the people developed and designed such user access control model.
出处 《电子设计工程》 2013年第3期50-53,共4页 Electronic Design Engineering
关键词 角色 RBAC LDAP XML 访问控制 role RBAC LDAP XML access control
  • 相关文献

参考文献8

二级参考文献24

  • 1刘清,黄兆华.G-逻辑及其归结推理[J].计算机学报,2004,27(7):865-873. 被引量:28
  • 2唐柳英,卿斯汉.混合RBAC-DTE策略的多角色管理[J].计算机学报,2006,29(8):1419-1426. 被引量:13
  • 3张海涛,刘志峰,李杨,王建华,杨文通.基于角色访问控制在权限管理中的研究与应用[J].微计算机信息,2006,22(09X):29-31. 被引量:14
  • 4Ferraiolo D,Kuhn R.Bole Based Access Controls[C]//Proceedings of the 15th NIST-NCSC National Computer Security Conference.Bahi-more:NIST-NCSC,1992:554-563.
  • 5Saodhu R,Coyne E J,Feinstein H L.Bole-Based Access Control Models[J].IEEE Computer,1996,29(2):3847.
  • 6Ferraiolo D,Sandhu R,Gavrila S.Proposed NIST standard for role-based access control[J].ACM Transactions on Information and System Secu-rity,2001,4(3):224-274.
  • 7FERRAIOLO D F, KUHN R. Role-based access controls[ C ]//Proc of the 15th NIST-NCSC National Computer Security Conference. 1992:554- 563.
  • 8SANDHU R, COYNE E J, FEINSTEIN H L. Role-based access control models [J]. IEEE Computer,1996,29(2) :38-47.
  • 9International Committee for Information Technology Standards (INCITS). ANSIINCITS 359-2004, American national standard for information technology:role-based access control[ S]. 2004.
  • 10FERRAIOLO D F, SANDHU R, GAVRILA S, et al. Propoesd NIST standard for role-based access control [J]. ACM Trans on Information and System Security, 2001,4(3) :224- 274.

共引文献46

同被引文献35

引证文献6

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部