期刊文献+

具有安全审计功能的RBAC委托模型

RBAC delegation model with security audit function
下载PDF
导出
摘要 针对访问控制中委托在安全性和功能性上的不足,通过对比分析RBAC委托模型的特点,结合安全审计概念提出了具有安全审计功能的RBAC委托模型,并给出了形式化的定义和描述。该模型定义了委托的限制条件和传递约束来体现委托的特性,利用审计记录集合实现了委托、撤销和会话授权的过程,通过审计监控和规则事件响应完善了安全审计功能,使委托授权具有自主性和可变性的特点。在管理信息系统的应用和实践表明,该模型是一种安全易管理的委托授权机制,能适应多种委托策略。 Considering the security and functionality deficiencies of delegation in access control, this paper proposes an RBAC delegation model with security audit function and gives its formal definition and description based on the contrastive analysis of RBAC delegation model's features and the concept of security audit. This model defines the restrictions and transmission constraints for delegation, which reflects the traits of delegation, implements the process of delegation,revocation and session authorization by applying audit record sets, and improves the security audit function by audit monitoring and rule event response to make the delegation authorization have its autonomy and variability. The application and practice in management information system implies that this model is a secure and easily manageable delegation authorization mechanism, which can suit multiple delegation strategy.
出处 《计算机工程与应用》 CSCD 北大核心 2015年第15期86-91,128,共7页 Computer Engineering and Applications
基金 国家自然科学基金(No.61173130)
关键词 安全审计 访问控制 委托 授权 security audit access control delegation authorization
  • 相关文献

参考文献14

二级参考文献36

  • 1欧阳荣彬,王倩宜,李丽,刘云峰.基于属性规则的用户授权模型研究与实现[J].中山大学学报(自然科学版),2009,48(S1):277-279. 被引量:8
  • 2叶春晓,吴中福,符云清,钟将,冯永.基于属性的扩展委托模型[J].计算机研究与发展,2006,43(6):1050-1057. 被引量:17
  • 3杨柳,危韧勇,陈传波.一种扩展型基于角色权限管理模型(E-RBAC)的研究[J].计算机工程与科学,2006,28(9):126-128. 被引量:38
  • 4[4]Ferraiolo D,Kuhn R.Role-Based Access Control[C]//the 15th National Computer security Conference,[S.l.]:[s.n.],1992.
  • 5Zhang Xinwen, Oh Sejong, Ravi S.PBDM: a flexible delegation model in RBAC[C]//Proc of the SACMAT' 03.Como, Italy: ACM Press,2003 : 149-157.
  • 6Barka E S.Framework for role-based delegation models[D].Fairfax,Virginia:George Mason University,2002.
  • 7Zhang Longhua,Ahn G J, Chu B T.A rule-based framework for role-based delegation[J].ACM Transactions on Information and System Security, TISSEC, 2003,6 (3) : 404-441.
  • 8Brewer D F C,Nash M J.The Chinese wall security policy[C]// Proc of the IEEE Symposium on Security and Privacy.Oakland, Calif: IEEE Press, 1989 : 215-228.
  • 9Ravi Sandhu, Edward Coyne, Hal Feinstein, et al. Role-based access control models. IEEE Computer, 1996, 29(2):38-47
  • 10Xinwen Zhang, Sejong Oh, Ravi Sandhu. PBDM: A flexible delegation model in RBAC. In: Proc. SACMAT'03. New York:ACM Press, 2003

共引文献48

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部