期刊文献+

一种基于RBAC的UCON管理模型 被引量:2

Administrative Model for UCON Based on RBAC
下载PDF
导出
摘要 UCON模型作为新一代的访问控制模型,能够通过可变属性对使用实现连续控制,可满足当前开放的网络环境需求。但UCON模型仍存在一些缺陷:不能实现对权限的管理、对权限的委托和对属性来源的管理。为此,在UCON模型的基础上引入角色元素并把角色分为提供者角色和消费者角色,然后把权限分为直接使用权限和需要授权权限,以实现对UCON模型中权限的管理和权限的委托,并通过提供者角色对可变属性的来源进行管理,使UOCN对权限管理更加灵活,属性来源更加可信,从而使UCON的应用范围更加广泛。 UCON is a new generation access control model. It can control usage continually by variable attribute to meet the current demand of open network. But there are still some drawbacks in UCON model, that is to say the authority management, authority delegation and attribute source management can not be achieved. So the role elements are intro- duced and divided into the provider role and the eonsumer role based on the UCON model. Then the authority is divided into the direct usage authority and the authority to be authorized, in order to achieve the management of authority and authority delegation in the UCON model. And through the role of the provider, the management of the source of variable attributes can be achieved, making UOCN more flexible in management of authority and the attribute source more relia- ble, so the application scope of UCON is more extensive.
作者 刘志锋 毛竹林 LIU Zhi-feng MAO Zhu-lin(School of Computer Science and Telecommunication Engineering,Jiangsu University, Zhenjiang 212013 ,China)
出处 《计算机科学》 CSCD 北大核心 2016年第10期150-153,共4页 Computer Science
关键词 UCON 角色 权限管理 权限委托 属性来源管理 UCON, Role, Authority management, Authority delegation, Attribute source management
  • 相关文献

参考文献4

二级参考文献44

  • 1李沛武.用基于角色访问控制实现使用控制模型的管理[J].南昌工程学院学报,2005,24(1):47-50. 被引量:5
  • 2王小明,赵宗涛.基于角色的时态对象存取控制模型[J].电子学报,2005,33(9):1634-1638. 被引量:18
  • 3张宏,贺也平,石志国.一个支持空间上下文的访问控制形式模型[J].中国科学(E辑),2007,37(2):254-271. 被引量:21
  • 4林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966. 被引量:67
  • 5Sandhu R, Bhamidipati V, Munawer Q. The ARBAC97 Model for Role-based Administration of Roles[J]. ACM Transactions on Information and System Security, 1999, 2(1): 105-135.
  • 6Park J, Sandhu R. The UCONABc Usage Control Model[J]. ACM Transactions on Information and System Security, 2004, 7(1): 128- 174.
  • 7Zhang Xinwen, Francesco P P, Sandhu R, et al. Formal Model and Policy Specification of Usage Control[J]. ACM Transactions on Information and System Security, 2005, 8(4): 351-387.
  • 8CHO J, SWAMI A, CHEN I. A survey on trust management for mobile ad hoc networks[J]. Commun Surveys & Tutorials, 2011, 13(4): 562-583.
  • 9YU H, SHEN Z, MIAO C. A survey of trust and reputation manage- ment systems in wireless communications[J]. Proc IEEE, 2010, 98(10) 1752-1754.
  • 10BUCHEGGER S, LE BOUDEC J. Performance analysis of the confi- dant protocol[A]. Proc 3rd ACM Int Syrup on Mobile Ad Hoc Net- working & Computing[C]. 2002.

共引文献216

同被引文献22

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部