期刊文献+

基于角色建模实现网络应用服务的访问控制 被引量:1

Implementing Access Control System for Net work Application Services by Role Modeling
下载PDF
导出
摘要 网络应用服务作为一种新型的服务理念,在信息化水平不是很高的机械行业有着极具潜力的发展前景,然而访问控制的处理仍然是制约其发展的一个瓶颈.本文结合在企业级CAPP系统THWebCAPP中的研究与实践,从软控制方面入手,引入基于角色的权限控制策略,结合对基于角色访问控制及相关知识的理解,考虑网络访问特点,提出访问控制模型-自适应基于角色访问控制模型,随后逐步讨论基于该模型实现对网络应用服务的访问控制. As a new service methodology,network application ser-vices(NAS) have a good potential future in the mechanical industry which infonnadon management is in low level. But the management of access control lag behind NAS level becomes the bottleneck in the de velopment and implement of NAS. From the point of view of soft-con trol, role-based access control( RBAC) is introduced. Exploiting RBAC content and correlative knowledge, considering the characteristics ofnetwork access, a access control model named adaptive role-based ac cess control model(ARBAC)is proposed based on the development and practice of an enterprise level CAPP system-THWebCAPP. Because ARBAC is self-governed and self-adaptive, access control system can be developed independently, plug and play. Based on this model, the ac cess control system for network application services is implemented step by step. The data models, functions and implementation technology of its modules are described in detail. Finally the new research directions are discussed.
出处 《成组技术与生产现代化》 2002年第1期16-21,共6页 Group Technology & Production Modernization
关键词 角色建模 网络应用服务 CAPP 访问控制 role adaptive expand-role network application XML
  • 相关文献

参考文献8

  • 1M.J.Moyer,M.Abamad.Generalized role-based access control[A].In:2001. 21st International Conference on Distributed Computing Systems[C]. Mesa, AZ:INSPEC, 2001.391 -398.
  • 2哈进兵,张友良.一种异地协同设计中的安全策略[J].工程设计学报,2001,8(1):17-20. 被引量:3
  • 3R.Sandhu,E.Coyne,H.Feinstein,et al.Role-based access control:A multi-dimensional view[A].In:10th annual computer security applications conference[C].Orlando,FL,USA:IEEE CS Press,1994.54-61.
  • 4Ahn, Gail-Joon.Role-based access control in DCOM[J].Journal of Systems Architecture, 2000,46(13):1175-1184.
  • 5Byong G.Lee, N.Hari Narayanan, Kai H.Chang.An integrated approach to distributed version management and role-based access control in computer supported collaborative writing[J]. Journal of Systems and Software, 2001, 59 (2) :119-134.
  • 6A.Lin, R.Brown.The application of security policy to role-based access control and the common data security architecture[J].Computer Communications,2000,23(17):1584-1593.
  • 7R.S.Sandhu,E.J.Coyne, H.L.Feinstein, et al.Role-based access control models[J]. Computer, 1996,29(2):38 -47.
  • 8T.P.De Carvalho,N.Edelweiss.A visual query system implementing a temporal object-oriented model with roles on a relational database[A]. 1997. Proceedings., XVII International Conference of the Chilean on Computer Science Society[C],Valparaiso, Chile:INSPEC,1997:38-47.

二级参考文献2

共引文献2

同被引文献6

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部