期刊文献+

网络电话管理系统中的信任度权限分配方法TD-RBAC

TD-RBAC permissions assignment method in VOIP management system
下载PDF
导出
摘要 针对分布式架构的网络电话管理系统的权限分配需求,结合传统基于角色的访问控制模型RBAC(rolebased access control)提出了信任度权限分配方法 TD-RBAC(trust degree RBAC).将用户-角色-权限的模型拓展到用户-角色-信任度-权限值的模型,将传统RBAC模型权限分配问题通过信任度和权限值的引入转化为可以定量分析的数学模型问题,从而解决了传统RBAC模型在角色和权限对应复杂的问题,使网络电话管理系统在权限分配的问题上更加简单灵活. According to the demand of permissions assignment in distributed architecture VOIP management system,combined with traditional role-based control model, a method of permissions assignment based on trust degreeTD-RBAC(Trust Degree RBAC) was provided. The user-role-permission model was extended to user-role-trustdegree -permission value model and the problem of permission assignment in traditional RBAC model wasconverted into mathematical quantitative analysis problem by introducing concept of trust degree and permissionvalue. This method has solved the complex problem of complicated correspondence between roles andpermissions, made permission assignment of VOIP management system more simple and flexible.
出处 《天津工业大学学报》 CAS 北大核心 2015年第1期68-72,共5页 Journal of Tiangong University
基金 国家自然科学基金青年基金项目(61302062)
关键词 网络电话管理系统 信任度 权限值 权限阈值 权限分配 VOIP management system trust degree permission value permission threshold permission assignment
  • 相关文献

参考文献12

二级参考文献47

  • 1潘德锋,徐少平,梁庆中,吴信才.基于操作的MIS多级授权模型的实现[J].计算机应用,2003,23(z1):100-102. 被引量:17
  • 2钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 3张宏,贺也平,石志国.一个支持空间上下文的访问控制形式模型[J].中国科学(E辑),2007,37(2):254-271. 被引量:21
  • 4李晓峰,冯登国,徐震.一种通用访问控制管理模型[J].计算机研究与发展,2007,44(6):947-957. 被引量:8
  • 51,Ferraiolo D F, Kuhn R. Role-Based access control. In: Proceedings of the 15th National Computer Security Conference. Baltimore, MD, 1992. 554~563, http://hissa.ncsl.nist.gov/kuhn/
  • 62,Sandhu R, Samarati P. Access control: principles and practice. IEEE Communications, 1994,32(9):40~48
  • 73,Ramaswamy C, Sandhu R. Role-Based access control features in commercial database management systems. In: Proceedings of the 21st National Information Systems Security Conference. Virginia: U.S. Government Printing Office, 1998, http://www.list.gmu.edu/conferen.htm
  • 84,Sandhu R, Coyne E J, Feinstein H L et al. Role-Based access control models. IEEE Computers, 1996,29(2):38~47
  • 95 Sandhu R. Rationale for the RBAC96 family of access control models. In: Proceedings of the 1st ACM Workshop on Role-Based Access Control. ACM, 1997. http://www.list.gmu.edu/conferen.htm
  • 10FERRAIOLO D F, KUHN R. Role-based access controls[ C ]//Proc of the 15th NIST-NCSC National Computer Security Conference. 1992:554- 563.

共引文献142

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部