期刊文献+

一种层次信任的多粒度RBAC扩展模型

An expanded RBAC model of multi-granularity based on trust hierarchies
原文传递
导出
摘要 针对企业级网络应用集成环境中授权和访问控制要求,提出一种以信任角色授权的分层和多粒度的访问控制扩展模型(EmRBAC),结合NIST-RBAC的标准模型,利用可信凭证扩展用户和角色之间的层次,增加角色的信任层次,并从系统、应用、操作对象的功能和级别、操作数据的时间周期等多个维度对标准模型进行了访问权限的粒度细化,加强访问权限的多粒度控制,并通过角色状态分层预处理,降低权限判别时的复杂性,提高访问控制效率。最后以开源门户eXo Platform为实验平台,给出了模型的访问控制流程以及应用实例,以验证提出模型的有效性。 Based on the application integration environment for enterprise network authorization and access control require- ments, a trust role authorization by stratified and multi-granular access control extension model (EmRBAC) is proposed, which is combined with NIST RBAC standard model, use the trusted credentials extension level between users and roles, and increase the role of trust level. From the system, applications, functions and operation of the object level, operating data time period and many other dimensions of the standard model, the elaboration of granularity of access rights is carried out. Through the role of the state stratification pretreatment reduced privileges determine the complexity and increase the efficiency of access control. Final, as an open source portal exobiology platform for experimentation platform, the model of access control processes and application examples are obtained to verify the effectiveness of the proposed model.
出处 《山东大学学报(理学版)》 CAS CSCD 北大核心 2013年第7期51-55,共5页 Journal of Shandong University(Natural Science)
基金 国家自然科学基金资助项目(61075049 61375121) 国家科技型中小企业技术创新基金资助项目(12C26243403509) 安徽高校省级自然科学研究项目(KJ2010B268 KJ2011A268) 六安市委托产学研重点项目(2012LWB010 2012LWA018)
关键词 扩展RBAC 信任层次 角色状态 多粒度 extended multi-granularity RBAC (EmRBAC) trust hierarchy role status multi-granularity
  • 相关文献

参考文献11

  • 1CHAKRABORTY S, RAY I. TrustBAC Integrating trust relationships into the RBAC model for access control in open systems[C]// Proceedings of the llth ACM Sym- posium on Access Control Models and Technologies. New York: ACM Press, 2006: 49-58.
  • 2CARLO Blundo, STELVIO Cimato. Managing key hier- archies for access control enforcement: heuristic approa- ches[ J ]. Computers & Security, 2010: 533-547.
  • 3BERBABE J B L, PEREZ J M M, CALERO J M A, et al. Semantic-aware multi-tenancy authorization system for cloud architectures [ J ]. Future Generation Computer Sys- tems,, http.//dx, doi. org/10. 1016/j. future. 2012.05. 011, 2012.
  • 4FUCHS L, PERNUL G, SANDHU R. Roles in informa- tion security-a survey and classification of the research ar- ea[ J]. Computers & Security, 2011, 30:748-769.
  • 5刘宏月,阎军智,马建峰.基于可信度的细粒度RBAC访问控制模型框架[J].通信学报,2009,30(S1):51-57. 被引量:7
  • 6马晓宁,冯志勇,徐超.Web服务中基于信任的访问控制[J].计算机工程,2010,36(3):10-12. 被引量:11
  • 7MARTINO A S, PERRAMON X, A model for securing E-banking authentication process: antiphishing approach [ C ]//Proceedings of IEEE Congress on Services. Wash- ington : IEEE Computer Society, 2011 : 251-254.
  • 8LI Dancheng, LIU Cheng. A hierarchical access control model for SaaS systems[J].International Journal of Modern Education and Computer Science (IJMECS), 2011, 5:47-53.
  • 9翟征德,冯登国,徐震.细粒度的基于信任度的可控委托授权模型[J].软件学报,2007,18(8):2002-2015. 被引量:34
  • 10李唯冠,赵逢禹.带属性策略的RBAC权限访问控制模型[J].小型微型计算机系统,2013,34(2):328-331. 被引量:21

二级参考文献55

  • 1沈海波,洪帆.基于策略的Web服务访问控制研究[J].计算机科学,2007,34(5):107-110. 被引量:5
  • 2OASIS. Profiles for the OASIS Security Assertion Markup Language(SAML) Version 2.0[Z]. (2005-03-15). http://docs.oasisopen.org/security/SAML/v2.0/SAML-profiles-2.0-os.pdf.
  • 3OASIS. eXtensible Access Control Markup Language(XACML) Version 2.0. Working Draft 09[Z], (2004-04-16). http://www. oasis-open.org/committees/download.php/6433/oasis-XACML-2.0- core-wd-09.zip.
  • 4Christopher S,RameshN,RayL.安全模式:J2EE、Web服务和身份管理最佳时间与策略[M].北京:机械工业出版社,2006.
  • 5Sabater J, Sierra C. Reputation and Social Network Analysis in Multi-Agent Systems[C]//Proceedings of the 1st International Joint Conference on Autonomous Agents and Multi-Agent Systems. Bologna, Italy: [s. n.], 2002: 475-482.
  • 6欧阳凯,沈晴霓,周敬利.基于RBAC模型的同名角色研究与设计[J].小型微型计算机系统,2007,28(8):1402-1406. 被引量:6
  • 7Sandhu RS,Coyne EJ,Feinstein HL,Youman CE.Role-Based access control models.IEEE Computer,1996,29(2):38-47.
  • 8ANSI INCITS 359-2004.Role based access control.American National Standard for Information Technology,2004.
  • 9Ferraiolo DF,Cugini J,Kuhn DR.Role-Based access control (RBAC):Features and motivations.In:Proc.of the 11th Annual Computer Security Application Conf.New Orleans:IEEE Computer Society Press,1995.241-248.
  • 10Joshi JBD,Bertino E,Latif U,Ghafoor A.A generalized temporal role based access control model.IEEE Trans.on Knowledge and Data Engineering,2005,17(1):4-23.

共引文献78

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部