期刊文献+

一种满足静态职责分离约束的角色划分方法 被引量:3

A Role Division Method Constrained by Static Separation of Duty
下载PDF
导出
摘要 现有自顶向下的角色工程忽略企业对敏感任务的要求,产生的角色集安全性低。为提高角色定义的安全性,提出一种满足静态职责分离约束的用户角色分配方法。从静态互斥角色约束集出发,利用贪婪算法产生互斥角色对并将其映射为稀疏图。使用韦尔奇·鲍威尔着色法将相邻顶点染为不同的颜色,生成的着色数近似等于最小用户数。根据角色被染颜色进行角色划分,被划分为同一组的角色只能指派给同一个用户。实验结果表明,该方法执行效率快、安全性高,可有效节省存储空间。 The existing top-down role of the project ignores the requirements of the enterprise for sensitive tasks,resulting in a low set of security.In order to improve the security of role division,a user role assignment method constrained by static separation of duty is proposed.Based on the static mutex exclusive role constraint set,the greedy algorithm is used to generate mutex role pairs and map them to sparse graphs.By using Welch Powell coloring method,adjacent vertices are dyed into different colors,and the number of coloring is approximately equal to the minimum number of users.Roles are divided according to their colors,and roles assigned to the same group can only be assigned to the same user.Experimental results show that this method is efficient,secure and it can save storage space effectively.
作者 王静宇 董景楠 谭跃生 WANG Jingyu;DONG Jingnan;TAN Yuesheng(School of Information Engineering,Inner Mongolia University of Science and Technology,Baotou,Inner Mongolia 014010,China)
出处 《计算机工程》 CAS CSCD 北大核心 2018年第10期190-195,203,共7页 Computer Engineering
基金 国家自然科学基金(61462069 61662056) 内蒙古自然科学基金(2016MS0608 2016MS0609)
关键词 静态职责分离 静态互斥角色约束 角色划分 最小用户数 着色数 static separation of duty Static Mutual Exclusive Role(SMER)constraint role division minimum number of users chromatic number
  • 相关文献

参考文献2

二级参考文献15

  • 1范小康,何连跃,王晓川,刘晓东,林彬,申彤,宋晓虹.一种基于RBAC模型的角色管理方法[J].计算机研究与发展,2012,49(S1):211-215. 被引量:19
  • 2Kuhlmann M,Shohat D,Schimpf G.Role Miningrevealing Business Roles for Security Administration Using Data Mining Technology[C]//Proceedings of the 8th ACM Symposium on Access Control Models and Technologies.Como,Italy:ACM Press,2003:179-186.
  • 3Molloy I,Chen Hong,Li Tiancheng,et al.Mining Roles with Semantic Meanings [C]//Proceedings of the 13th ACM Symposium on Access Control Models and Technologies.Estes Park,USA:ACM Press,2008:21-30.
  • 4Zhang Dana,Ramamohanarao K,Ebringer T.Role Engineering Using Graph Optimization[C]//Proceedings of the 12th ACM Symposium on Access Control Models and Technologies.Sophia Antipolis,France:ACM Press,2007:139-144.
  • 5Ene A,Horne W,Milosavljevic N,et al.Fast Exact and Heuristic Methods for Role Minimization Problems [C]//Proceedings of the 13th ACM Symposium on Access Control Models and Technologies.Estes Park,USA:ACM Press,2008:1-10.
  • 6Vaidya J,Atluri V,Guo Qi.The Role Mining Problem: Finding a Minimal Description Set of Roles [C]//Proceedings of the 12th ACM Symposium on Access Control Models and Technologies.Sophia Antipolis,France:ACM Press,2007:175-184.
  • 7Ma Xiaopu,Li Ruixuan,Lu Zhengding,et al.Mining Constraints in Role-based Access Control [J].Mathematical and Computer Modelling,2012,55(1):87-96.
  • 8Kumar R,Sural S,Gupta A.Mining RBAC Roles Under Cardinality Constraint [C]// Proceedings of the 6th International Conference on Information Systems Security.Gandhinagar,India: Information Systems Security Press,2010:171-185.
  • 9Vaidya J,Atluri V,Warner J.RoleMiner:Mining Roles Using Subset Enumeration[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.Alexandria,USA:ACM Press,2006:144-153.
  • 10Li Ninghui,Tripunitara M V,Bizri Z.On Mutually Exclusive Roles and Separation of Duty [J].ACM Transactions on Information and System Security,2007,10(2):42-51.

共引文献9

同被引文献10

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部