期刊文献+

具有时空约束的TRBAC模型在OA中的应用 被引量:3

Application of TRBAC model with temporal and spatial constraints in OA
原文传递
导出
摘要 本文提出了一个基于TRBAC(Task-Role Based Access Control)具有时空约束的工作流授权模型TSC-TRBAC(Temporarily-Spatially Constrained Task-Role Based Access Control)。所谓时空约束即用户执行任务的时候,不仅受到时间约束,而且还受到空间限制,包括对物理空间和逻辑空间的限制,这使得工作流的安全性得以保证。通过将该模型应用到具体的系统中,表明了该模型的可行性。 A temporarily-spatially constrained model based on TRBAC (Task-Role Based Access Control ) is proposed in workflow system.Temporary and spatial Constraint is that user is not only constrained by temporality, but also constrained by spatiality when the task is executed by user.The model suggests that a property of security level should be increased in task.Task may have the property of high security level and low security level.It shows the feasibility by means of application in OA.
作者 周炜
出处 《网络安全技术与应用》 2014年第8期116-117,共2页 Network Security Technology & Application
关键词 TRBAC 工作流 约束 空间 OA TRBAC Workflow Constraint Space OA
  • 相关文献

参考文献7

二级参考文献48

  • 1邢光林,洪帆.一个基于RBAC的工作流授权模型[J].小型微型计算机系统,2005,26(3):544-547. 被引量:6
  • 2Sandhu R S,Coyne E J,Feinstein H L.Role-based access control models[J].IEEE Computer,1996,39(2):38-47.
  • 3Atluri V,Huang W K.Enforcing mandatory and discretionary security in workflow management systems[J].Journal of Computer Security,1997,5(4):303-339.
  • 4Adam N R,Atluri V,Huang W K.Modeling and analysis of workflows using petri nets[J].Journal of Intelligent Information Systems,1998,10(2):131-158.
  • 5Ahn G J.Injecting RBAC to secure a web-based workflow system[A].In Proceeding of Fifth ACM Workshop on Role-Based Access Control[C].Berlin:ACM,2000.26-28.
  • 6Atluri V,Huang W K,Bertino E.A semantic based execution model for multilevel secure workflows[J].Journal of Computer Security,2000,8(1):3-41.
  • 7Atluri V,Huang W K.A petri net based safety analysis of workflow authorization models[J].Journal of Computer Security,2000,8(2):83-94.
  • 8Kandala S,Sandhu R S.Secure role-based workflow models[EB/OL].http:∥www.list.gmu.edu/confrnc/ifip/i01-rbwm.pdf,2001-10-31.
  • 9Wu S L,Sheth A,Miller J,et al.Authorization and access control of application data in workflow system[J].Journal of Intelligent Information System,2002,18(1):71-94.
  • 10Atluri V.Security for workflow systems[EB/OL].http:∥cimic.rutgers.edu/~atluri/workflow.pdf,2003-02-05.

共引文献158

同被引文献27

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部