期刊文献+

基于RBAC的软件仓库安全管理模型研究

Research on the security model of software management based on RBAC
下载PDF
导出
摘要 通过深入分析当前典型软件仓库应用框架及其安全性的不足,并结合基于角色的访问控制(Role-Based Access Control,RBAC)模型的特点,提出了一种基于RBAC的软件仓库安全管理模型,并对该模型控制下的软件仓库数据库实现进行设计。实践证明,将访问控制模型结合实际应用于软件仓库管理过程中,能够较好的实现对不同级别用户软件下载安装进行有效的权限控制,进一步提高软件管理平台的安全性。 Through the deep analysis of the shortages about the framework and security of the typical software repository, a security management model of software repository based on RBAC is proposed combined with the characteristics of RBAC (Role-Based Access Control),and designs the database of the software repository based on RBAC.Practice has proved that the access control model can be used to control download and install according to the different levels of users effectively in the process of software management, and further improve the security of the software management platform.
出处 《电子设计工程》 2016年第3期4-7,10,共5页 Electronic Design Engineering
基金 核高基国家重大科技专项(2013ZX01045-004)
关键词 RBAC 软件仓库 框架 模型 RBAC software repository framework model
  • 相关文献

参考文献3

二级参考文献30

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2孙永,王雄.一种域增强的RBAC模型及其管理模型[J].计算机工程与应用,2005,41(6):60-64. 被引量:2
  • 3R.S.Sandu,E.J.Loyne,et al.Role-Based Access Control Models.IEEE Transaction on Computer,1996;(2)
  • 4Sandhu R,Ferraiolo D,Kuhn R.The NIST Model for Role Based Access Control:Towards a Unified Standard.In:Processding of 5 ACM Workshop on Role-Bassed Access Control,ACM,Berlin,Germany,2000-07
  • 5Sylvia Osbom,Ravi Sandhu,Qamar Mumawer.Configuring Role-based Access Control to Enforce Mandatory and Discretionary Access Control Policies.ACM Transactions on Information and System Security,2000;(2)
  • 6D F Ferraiolo, R Kuhn. Role-based access control. The 15th National Computer Security Conf, Baltimore, MD, 1992. http://hissa.ncsl.nist.gov/kuhn
  • 7R S Sandhu et al. Role-based access control models. IEEE Computer, 1996, 29(2): 38~47
  • 8P Loscocco et al.The Inevitability of failure: The flawed assumption of security in modern computing environments, national security agency. The 21st National Information Systems Security Conf, Virginia, USA, 1997
  • 9David F Ferraiolo. An argument for the role-based access control model. The 6th ACM Symp on Access Control Models and Technologies, Chantilly, Virginia, USA, 2001
  • 10R Sandhu, P Samarati. Access control: Principles and practice. IEEE Communications, 1994, 32(9): 40~48

共引文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部