期刊文献+

基于RBAC的复杂信息系统中访问控制模型的设计 被引量:5

Design of the RBAC-based Access Control Model in the Complex Information Systems
下载PDF
导出
摘要 针对复杂信息系统中因角色数量多、用户职责属性经常动态改变等导致访问控制复杂的问题,在充分考虑用户的组织形式与授权关系的基础上,以用户所在机构、用户分组信息为角色分配主体,同时增加信息系统中资源访问操作权限范围限定,改进了RBAC模型并设计了实现改进模型的数据关系。实践结果显示,改进模型不仅可以方便地完成机构和用户组职责改变时对所涉及用户授权的修改,而且可以快速响应因人员职责属性改变引起的授权修改,同时能够灵活地完成资源访问操作权限的控制。 To the complexity control problems in a complex information systems which was usually caused by the management of large numbers roles and the dynamically changing of the user's responsibilities attributes,in this paper,we based on the full consideration of the relationship between the user's authorization and the form of the use's organization,used the organization and group as the main body to assigned the roles,and increasing the resource access permissions scope defined in information system,we proposed an improved RBAC model and designed the realized data relationships.Practical results show that not only can be easily complete the authorization which caused by the responsibilities changing of the organization and groups,and can quickly respond to the change of the property caused by the personnel duty,at the same time can flexibly achieve the resource access permissions.
出处 《计算机科学》 CSCD 北大核心 2014年第S1期429-432,共4页 Computer Science
基金 国家自然科学基金项目:云计算环境下双模型驱动的面向软件动态演化的建模与分析(61379032)资助
关键词 RBAC 访问控制 权限管理 资源管理 用户组 Role-based access control,Access control,Authority management,Resource management,User group
  • 相关文献

参考文献6

  • 1刘强,王磊,何琳,危剑安,陈锐.RBAC模型研究历程中的系列问题分析[J].计算机科学,2012,39(11):13-18. 被引量:16
  • 2李凤华,苏铓,史国振,马建峰.访问控制模型研究进展及发展趋势[J].电子学报,2012,40(4):805-813. 被引量:127
  • 3沈海波,洪帆.访问控制模型研究综述[J].计算机应用研究,2005,22(6):9-11. 被引量:87
  • 4Coyne, Ed,Weil, Timothy R.ABAC and RBAC: Scalable, Flexible, and Auditable Access Management[J].IT Professional Magazine.2013(3)
  • 5David F. Ferraiolo,Ravi Sandhu,Serban Gavrila,D. Richard Kuhn,Ramaswamy Chandramouli.Proposed NIST standard for role-based access control[J].ACM Transactions on Information and System Security (TISSEC).2001(3)
  • 6Ravi Sandhu,Venkata Bhamidipati,Qamar Munawer.The ARBAC97 model for role-based administration of roles[J].ACM Transactions on Information and System Security (TISSEC).1999(1)

二级参考文献68

  • 1姚键,茅兵,谢立.一种基于有向图模型的安全策略冲突检测方法[J].计算机研究与发展,2005,42(7):1108-1114. 被引量:29
  • 2王小明,赵宗涛.基于角色的时态对象存取控制模型[J].电子学报,2005,33(9):1634-1638. 被引量:18
  • 3杨秋伟,洪帆,杨木祥,朱贤.基于角色访问控制管理模型的安全性分析[J].软件学报,2006,17(8):1804-1810. 被引量:38
  • 4张宏,贺也平,石志国.一个支持空间上下文的访问控制形式模型[J].中国科学(E辑),2007,37(2):254-271. 被引量:21
  • 5L Snyder. Formal Models of Capability-based Protection Systems[ J].IEEE Transactions on Computers, 1981,30(3 ) :172-181.
  • 6R Sandhu, E Coyne, H Feinstein. Role-based Access Control Models[ J]. IEEE Computer, 1996,29 (6) :38-47.
  • 7D Ferraiolo, R Sandhu,et al. Proposed NIST Standard for Role-based Access Control [ J ]. ACM Transactions on Information and System Security(TISSEC) ,2001,4(3) :224-274.
  • 8R Thomas, R Sandhu. Task-Based Authorization Controls(TBAC) : A Family of Models for Active and Enterprise-Oriented Authorization Management[ C]. Lake Tahoe, CA: Proceedings of the 11th IFIP WG11.3 Conference on Database Security, 1997.
  • 9Gail-Joon Ahn, Myong Kang,et al. Injecting RBAC to Secure a Webbased Workflow System[ C]. ACM RBAC, 2000.
  • 10Sejong Oh, Seog Park. Task-role-based Access Control Model[ J ]. Information System, 2003, 28 : 533-562.

共引文献222

同被引文献35

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部