期刊文献+

基于角色访问控制的数据库安全模型研究

Research on Role-based Database Secure Access Control
下载PDF
导出
摘要 目前比较成熟的安全模型大部分是访问控制策略模型,用于描述与维护系统中数据的保密性和完整性。基于角色的访问控制(RBAC)借鉴了人们熟知的用户组、权限组以及职责分离的概念和应用,以角色为中心的权限管理更符合公司和企业的实际管理方式,所以RBAC模型的研究和应用发展得非常快。通过给用户分配恰当的角色,使角色拥有一定的权限成为访问控制的主体,可以提高管理效率。介绍了基于角色的出租车管理系统的部分设计;阐述了模块设计与应用和数据库的设计理念;成功地实现了对不同角色的安全访问控制,有效地解决了安全访问控制问题。 Access control policy model is at present an safe and relatively mature control way, used to describe and maintenance of the confidentiality of data in the system. Role based access control is drawing a known user group , permissionsgroup and the concept of separation of duties and applications . The paper discusses a database security scheme based on RBAC, which relates access privilege and role, and through assigning to the user the suitable role,makes the role a mainbody of access control thus enhancing the management efficiency. In the paper, system design, database design is describes based on role in the taxi service quality assessment system. Thus, the secure access control on the different rolesis realized and the problems of secure access control effectively solved.
作者 程娜
出处 《软件导刊》 2013年第3期152-155,共4页 Software Guide
关键词 角色访问控制 安全模型 安全访问控制模块 数据库 RBAC Role Security Access Module Datebase
  • 相关文献

参考文献2

二级参考文献8

  • 11,D. Ferraiolo, J. Cugini, and D.R.Kuhn. Role Based Access Control: Features and Motivations. In Annual Computer Security Applications Conference. IEEE Computer Society Press, 1995
  • 22,D. Richard Kuhn. Mutual Exclusion of Roles As a Means of Implementing Separation of Duty in Role-Based Access Control Systems National Institute of Standards and Technology. Gaithersburg, Maryland 20899
  • 33,E. B. Fernandez and J. C. Hawkins. Determing Role Rights from Use Cases. ACM97
  • 44,J. F. Berkley. Comparing Simple Role Based Access Control Models and Access Control Lists. NIST. Gaithersburg, MD 1997
  • 55,Observations on the Real-World Implementation of Role-Based Access Control. http://www.schumannsoftware.com/.
  • 6Ferraiolo D F,Barkley J F,Kuhn D R.A Role Based Access Control Model and Reference Implementation Within a Corporate Intranet ACM Transactions on Information Systems Security, 1999-02
  • 7Gavrila S I, Barkley J F. Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management. Third ACM Workshop on Role-based Access Control, 1998
  • 8Sandhu R, Coyne E J,Feinstein H L,et al. Role-based Access Control Models. IEEE Computer, 1996,29(2)

共引文献96

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部