期刊文献+

用RBAC实现DAC和MAC的一种方法 被引量:3

Implementation of DAC and MAC Using RBAC
下载PDF
导出
摘要 提出一种用RBAC实现传统的DAC和MAC的方法.给出了形式化描述,并举例说明.只要灵活配置RBAC,就可实现多种安全策略. This paper proposes a way to implement traditional DAC and MAC using RBAC. gives the formal expression and some examples. RBAC can be flexibly configured to implement multiple security policies.
出处 《计算机工程》 CAS CSCD 北大核心 2000年第10期62-64,共3页 Computer Engineering
关键词 RBAC DAC MAC 计算机安全 DAC MAC ACL Bell-LaPadula model RBAC
  • 相关文献

参考文献6

  • 1[1]Department ofDefense ComputerSecuritvCenter. Trusted Computer System Evaluation Criteria. DoD 5200. 28-STD, 1985
  • 2[2]Ferraiolo D, Cugini J, Kuhn R. Role Based Access Control (RBAC): Features and Motivations,In Proceedings of 11th Annual Computer Security Application Conference, New Orleans, LA,1995 -12:241-248
  • 3[3]Sandhu S, Coyne E J, Feinstein H L, et al. Role-based Access Control Models. IEEE Computer, 1996, 29(2):38-47
  • 4[4]Bell D, LaPadula L. Secure Computer Systems: Mathematical Foundations. MITRE Technical Report 2547, 1973,1
  • 5[5]Biba K. Integrity Considerations for Secure Computer Systems.Technical Report MTR-3153, the MITRE Corporation, Bedford,MA, 1975
  • 6[6]Clark D, Wilson D. A Comparison of Commercial and Militurv Computer Security Policies. In IEEE Svmposium on Security and Privacy, 1987

同被引文献11

  • 1蔡菁.基于角色的多层应用系统安全控制[J].计算机工程与应用,2001,37(14):106-108. 被引量:5
  • 2李斓,冯登国,徐震.RBAC与MAC在多级关系数据库中的综合模型[J].电子学报,2004,32(10):1635-1639. 被引量:13
  • 3Dr Avi Saha.Application Framework for e-business:Portals.http:// www. 106.ibm.com/developerworks/web/library/wa-portais.
  • 4Charu Aggarwal,Jim Challenger,Daniel Dias et al.Web site Personalization.http ://www-900.ibm.com/developerWorks/cn/wsdd/hvws/ personalize_eng.shtml.
  • 5胡道元.网络安全[M].北京:清华大学出版社,2006:73-74.
  • 6R Sandhu, et al. The ARBAC97 model for role - based administration of roles: Preliminary description and outline[ C]. Proceedings of the Second ACM Workshop on Role - Based Access Control. Fairfax, Virginia, USA: ACM Press,1997.41 -50.
  • 7J Park, R Sandhu. RBAC on the Web by smart certificate[ C]. Proceedings of the 4th ACM Workshop on Role - Based Access Control. Fairfax, Virginia, USA: ACM Press, 1999. 1 -9.
  • 8R Sandhu. Issues in RBAC [ C ]. Proceedings of the 1st ACM Workshop on Role -Based Access Control. Fairfax, Virginia, USA: ACM Press, 1996. 21 -24.
  • 9张晓辉,王培康.大型信息系统用户权限管理[J].计算机应用,2000,20(11):35-36. 被引量:55
  • 10汤鹏翔,陈梦东,刘连忠,马林胜.一种实用的基于角色访问控制系统设计与实现[J].计算机应用,2002,22(12):41-43. 被引量:7

引证文献3

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部