期刊文献+

一种动态角色委托代理授权模型 被引量:14

A RBAC Dynamically Delegating Grant Model
下载PDF
导出
摘要 1引言近年来,随着计算机信息系统安全问题愈来愈重要,对数据存取控制策略的研究已成为当前信息系统领域研究的热点问题之一.目前,存取控制主要有三种:自主存取控制(DAC,Discretionary Access Control),强制存取控制(MAC,Mandatory Access Control)和基于角色的存取控制(RBAC,Role-Based Access Control)[1~4]. RBAC(Role-Based Access Control) has been the most promising access control policy that is generally acknowledged currently, and becomes one of hot research topics in the area of information. The role grant management in traditional RBAC is only done by system (or security) administrator, it is static. Under some special circumstances . such as medical emergency treatment and fireproof, in current RBAC models, a serious problem exists: when the system administrator or the role that is being required is just absent, the other roles in the system have no ways to legally obtain a qualification so as to temporarily take the place of the absent role. In this paper, With a RBAC dynamic delegating grant (RBAC-DDG) mechanism being introduped, the new role-role relations and the novel grant model. RBAC-DDG, as well as its dynamic grant protocol are proposed, The above problem can be addressed better using this model . On the basis of an abstracted medical emergency system, the application scope of RBAC-DDG is discussed, and on RBAC-DDG, some future problems to be further studied are also given.
出处 《计算机科学》 CSCD 北大核心 2002年第2期66-68,共3页 Computer Science
关键词 信息安全 信息系统 计算机 角色 存取控制 动态角色委托代理授权模型 RBAC, RBAC-DDG, Role delegating agent, Protocol
  • 相关文献

参考文献9

  • 1Department of Defence (USA). Department of Defense Trusted Computer system evaluation criteria. DoD 5200-78-STD, DoD,1985
  • 2Sandhu R,Ferraiolo D, Kuhn R. The NIST model for role-based access control: towards a unified standard. In: Proc. of 5th ACM Workshop on Role-Based Access Control, ACM, Berlin, Germany, July, 2000
  • 3Osborn S,Sandhu R,Munawer M. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security,2000,3(2)
  • 4Sandhu R,et al. Role-baseed access control model. IEEE Computer,1996,29(2)
  • 5Sandhu R. Role activation hierarchies. In: Proc. of 3rd ACM Workshop on Role-Based Access Control, ACM, Fairfax, Oct. 1998
  • 6Sandhu R,et al. Role-based access control models. IEEE Computer, 1996,29 (2): 38~47
  • 7Ahn G J,Sandhu R. The RSL99 language for role-based separation od duty constraints. In: proc. of 4th ACM Workshop on RoleBased Access Control, Fairfax, VA ,Oct. 1999.43~ 54
  • 8Sandhu R,Bhamidipati V,Munawer Q. The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and system Security, 1999,2(1 ): 105~ 135
  • 9Schneier B. Applied Cryptography-protocols, algorithims and source code in C. John Wiley & Sons, Inc. Second Edition, 1996

同被引文献101

引证文献14

二级引证文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部