期刊文献+

一种扩展的TBAC访问控制模型研究 被引量:3

Research of Authorization Model Based TBAC
原文传递
导出
摘要 基于任务访问控制模型(TBAC)与传统的访问控制模型不同,它不是将访问许可与角色或用户联系起来,而是将许可与任务联系。本文在基于任务的访问控制对象建模的基础上,为使不同的异质的工作流系统下的任务可以安全地迁移,授权的紧密性得到保证,引入了授权单元的概念,并在工作流系统中讨论了授权单元的应用,将授权与工作流紧密结合,强调上下文联系,最后就实际解决TBAC模型中存在的授权原子性和事件触发等问题讨论了解决方案。 Task -based access control is different from the classic access control m odels,modeling of authorization in tasks is as well as the monitoring and management of au thorization processing and life -cycles as tasks progress.This paper injects authorization unit to ensur e the ideas of united task and pre-sents a basic concept of new authoriz ation model.In this paper,how to support united tasks and how to run tasks based event is researched.
出处 《通信技术》 2002年第11X期95-97,共3页 Communications Technology
关键词 访问控制 授权 TBAC 授权单元 工作流 access control,authorization,TBA C,authorization unit,workflow
  • 相关文献

参考文献2

二级参考文献8

  • 1[1]R. K Thomas and R. S Sandhu. Towards a task-based paradigrm for flexible and adaptable access control in distributed applications[A]. Proc. of the Second New Security Paradigms Workshop[C]. Little Compton, Rhode Island, IEEE Press, 1993.
  • 2[2]R.K. Thomasand R. S Sandhu. Conceptual Foundations for a Mocdel ofTask-based Authorizations[A]. Proc. of the 7thIEEE Computer Security Foundations Workshop[C].Franconia,NH, 1994,6: 66~79.
  • 3[3]Ravi S.Sandu,Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Role-based access control models[J]. IEEE Computer,1996.29(2): 38~47.
  • 4[4]Ravi S. Sandu. Separatin of dutiesin computerized information systems[A]. S. Jajodia and C. E.Landwehr. Data base Security IV:Status and ProsPeets[M]. North-Holland, 1991: 179~ 189.
  • 5[5]R. K. Thomas and R. SSandhu. Task-based Authorization Controls (TBAC) :A Family of Models for Active and Enterprise-oriented Authorization Management[A]. 1997 IFIP[C]. Lake Tahoe California,Published by Chapman & Hall,1997,8:11 ~ 13.
  • 6[6]Roshan Thomas,Ravi Sandu. Task-based Authorization :A Research Project in Next-generation Active Security Models forW orkflows[DB/OL].http://www. oracorp. com/tba, 1996-04-16.
  • 7[7]Ravi S. Sandhu. Access Control:The Neglected Frontier[A]. Proc. First Australasian Conference on Information Security and Privacy[C]. Wollongong, Australia, 1996,6:23~26.
  • 8朱虹,冯玉才.MIS系统的授权管理[J].计算机工程与应用,1999,35(3):72-74. 被引量:9

共引文献61

同被引文献18

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部