期刊文献+

基于承诺-担保的访问控制模型 被引量:1

A Promise-Assurance-Based Access Control Model
下载PDF
导出
摘要 访问控制模型是信息安全领域研究的重点之一 .现有文献中可以见到许多访问控制模型 ,但其只能依据已有的事实由授权系统单方面对授权请求进行判定处理 ,不适合电子商务环境下根据用户对未来可满足条件的承诺进行交互式访问授权的需要 .提出了新的基于承诺 担保的访问控制模型 (PABAC)以满足上述访问控制需要 .讨论了模型体系结构 ,承诺担保机制 ,授权职责分离以及访问控制 . The research of access control model is a topic of information security area.There are many access control models in existing literatures,but they process the access requests only depending on existing conditions by themselves.Therefore they are not able to meet the need that authorization process must interact with users and that user's promises of the future actions are authorization conditions under electronic commerce environment.A promise assurance based access control model (PABAC) is presented to achieve the above access control need.Its architecture,promise & assurance mechanism, separation of duties of authorization and access control are discussed.The experimental results express its validity.
出处 《电子学报》 EI CAS CSCD 北大核心 2003年第8期1150-1154,共5页 Acta Electronica Sinica
基金 国家自然科学基金 (No .90 2 0 4 0 1 2 ) 国家"863"计划 (No.2 0 0 2AA1 4 30 2 1 )
关键词 访问控制 交互式授权 承诺 担保 职责分离 access control interacting authorization promise assurance separation of duty
  • 相关文献

参考文献6

  • 1王小明,赵宗涛,马建峰.一种新的RBAC角色协同关系及其Petri网模型[J].电子学报,2003,31(2):225-227. 被引量:4
  • 2C Bettini, S Jajodia. Provisions and obligations in policy management and security applications [ A ]. In the proceedings of the 28th VLDB conference[ C ]. USA: VLDB press, 2002.
  • 3S Jajodia, V Subrahmanian. Provisionalauthorizations [ M]. USA: KluwerAcademic Press,2001.133 - 159.
  • 4C Bettini, S Jajodia. Obligation monitor in policy management [A ]. In the proceedings of the IEEK 3td intemal c~ference on policies for distributed systems and network[ C ]. USA: lEEK Press, 2002.158- 178.
  • 5R T Simon, M E Zurko. Separation of duty in role-based environments[A] .Proceedings of ACM on Computer Foundations Workshop[ C].USA:ACM Press, 1997.43 - 55.
  • 6N W Paton,O Diaz. Active database system[J]. ACM Computing Surveys, 1999,31(1) :63 - 103.

二级参考文献5

  • 1Sandhu D Ferraiolo, R Kuhn. The NIST model for role-based access control:towards a unified standdard . In the Proceedings of 5^th ACM Workshop on Role-based Access Control. USA: ACM, 2000.60- 110.
  • 2D Richard kuhn. Mutual exclusion of roles as a means of implementing separation of duty in role-based access controlsystems [A] .In the Proceedings of the Second ACM Workshop on Role-based Access Control[ C]. USA : ACM, 1997. 240 - 252.
  • 3R Sandhu, P Samarafi. Access control principles and practice[J]. IEEE Comm, 1999:40- 48.
  • 4刘婷,林闯,刘卫东.基于时间Petri网的工作流系统模型的线性推理[J].电子学报,2002,30(2):245-248. 被引量:34
  • 5王小明,赵宗涛,冯德民.一种动态角色委托代理授权模型[J].计算机科学,2002,29(2):66-68. 被引量:14

共引文献3

同被引文献64

  • 1WANG Xiaoming,ZHAO Zongtao.A Service Oriented Voting Authorization Model[J].Chinese Journal of Electronics,2006,15(1):37-40. 被引量:2
  • 2M LeMay,O Fatemieh,C A Gunter.PolicyMorph:interactive policy transformations for a logical attribute-based access control framework[A].Proceedings of the 12th ACM Symposium on Access Control Models and Technologies[C].New York:ACM,2008.205-214.
  • 3V Kolovski,J Hendler,B Parsia.Analyzing web access control policies[A].Proceedings of the 16th International Conference on World Wide Web[C].New York:ACM,2007.677-686.
  • 4E Yuan,J Tong.Attributed based access control (ABAC) for web services[A].Proceedings of the IEEE International Conference on Web Services[C].Washington:IEEE Computer Society,2005.561-569.
  • 5C Ye,Z Wu,Y Fu.An attribute-based delegation model and its extension[J].Journal of Research and Practice in Information Technology,2006,38 (1):3-17.
  • 6J Michael,R Manoj.A contextual attribute-based access control model[A].Proceedings of 2006 Workshops on the Move to Meaningful Internet Systems[C].Berlin:Springer,2006.1996-2006.
  • 7J Park,R Sandhu.The UCONABC usage control model[J].ACM Transactions on Information and System Security,2004,7(1):128-174.
  • 8D Q Zou,L G He,H Jin,et al.CRBAC:imposing multigrained constraints on the RBAC model in the multi-application environment[J].Journal of Network and Computer Applications,2009,32(2):402-411.
  • 9R Yang,C Lin,F Feng.A time and mutable attribute-based access control model[J].Journal of Computers,2009,4(6):510-518.
  • 10M A Al-Kahtani,R Sandhu.A model for attribute-based userrole assignment[A].Proceedings of the 18th Annual Computer Security Applications Conference[C].Washington:IEEE Computer Society,2002.353-362.

引证文献1

二级引证文献84

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部