期刊文献+

任意偏序的NTree判定及近似表示 被引量:1

Recognition and Approximation of NTree for a Partial Order
下载PDF
导出
摘要 用角色而不是个体作为存取控制的粒度单位有许多优点 ,这些优点在层次 RBAC(偏序 )中得到进一步体现 ,NTree是定义这种偏序既自然又系统的方法 .本文介绍了偏序的超矩阵表示及相应的 NTree判别和近似表示方法 . There are many benefits for providing access control with roles of users rather than individuals as the unit of granularity .The benefits are enhanced if the roles are organized in a hierarchy (or partial order). In this paper, the super matrix representation of a hierarchy ,and the recognition and approximation of NTree are introduced.
出处 《小型微型计算机系统》 CSCD 北大核心 2002年第8期982-984,共3页 Journal of Chinese Computer Systems
基金 国防预研基金资助 江西省教委科研基金 (〔2 0 0 0〕2 5 4)资助
关键词 任意偏序 NTree判定 近似表示 角色存取控制 超矩阵 信息安全 role based access control(RBAC) partial order NTree super matrix approximation
  • 相关文献

参考文献5

  • 1[1]Ferraiolo,D.F., Barkley,J.F., and Kuhn,D.R. A role based access control model reference implementation within a corporate intranet[J]. ACM Transactions on Information and System Security.Feb 1999.2(1):51~74
  • 2[2]Sandhu, R.S., Coyne,E.J., Feinstein,H.L., and Youman, C.E. Role-based access control models[J]. IEEE Computer, Feb. 1996.29(2):38~47
  • 3[3]Sandhu, R.S. Recognizing immdiacy in an N-tree hierarchy and its application to protecion groups[J].IEEE Transaction on Software Engineering. Dec. 1989. 15(12),125~141
  • 4[4]Sandhu, R.S. The NTree: a two dimension partial order for protection groups[J]. ACM Transaction on Computer Systems. May 1988.6(2): 197~222
  • 5[5]Sandhu, R. and Ganta, S. Recognition and approximation of NTree based on binary refinements[EB/OL].http://www.list.gmu.edu/progress.htm

同被引文献6

  • 1David Ferraiolo, Janet Cugini, Richard Kuhn. Role-based access control(RBAC): features and motivations[C]. In: Proceedings of 11th Annual Computer Security Application Conference, New Orleans, LA, December 11-15 1995,241-48.
  • 2Luigi Guiri. A new model for role-based access control[C]. In: Proceedings of 11th Annual Computer Security Application Conference, New Orleans,LA,December 11-15 1995,249-255.
  • 3Ravi S Sandhu, Edward J Coyne, Hal L Feinstein et al. Role-based access control models[J]. IEEE Computer, Feb. 1996,29(2):38-47.
  • 4Ravi Sanhu, Edward J Coyne, Hal L. Feinstein et al. Role-based access control models[J]. IEEE Computer, 1996,29(2):38-47.
  • 5Ravi Sandhu, Venkata Bhamidipati, Qamar Munawer. The ARBAC97 model for role-based administration of roles[J]. ACM Transactions on Information and System Security. 1999,2(1):105-135.
  • 6Elisa Bertino, Elena Ferrari, Vijay Alturi. Specification and enforcement of authorization constraints in workflow management systems[J]. ACM Transactions on Information and System Security,1999, 2(1):65-104.

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部