期刊文献+

PRBAC:一种基于角色的起源访问控制模型 被引量:1

PRBAC:A role-based provenance access control model
下载PDF
导出
摘要 为了更好地利用数据起源对其它数据进行访问控制,建立了一种基于角色的起源访问控制模型(PRBAC).该模型以基于起源的访问控制模型(PBAC)和基于角色的访问控制模型(RBAC)为基础,划分了作为访问控制基础的依赖关系列表,并引入RBAC中角色集的概念,给出了具体的访问控制算法.分析结果表明PRBAC能解决基于起源的访问控制模型中授权管理不灵活、系统运行效率低和访问控制策略不够安全等问题. T his paper proposes a novel role-based provenance access control model (PRBAC )to better utilize provenance data to control access to the other data .The model is built on prove‐nance-based access control (PBAC) and role-based access control (RBAC) .And this scheme di‐vided the dependency list as a foundation of access control ,introduced the notion of role in role-based access control and gave out the access control algorithm .The analysis results indicate the proposed model can solve the issues that the authorization management is not flexible ,the system has low access efficiency and access control policy is not secure enough ,and other problems .
出处 《山东理工大学学报(自然科学版)》 CAS 2016年第2期18-22,共5页 Journal of Shandong University of Technology:Natural Science Edition
基金 国家自然科学基金项目(61473179) 山东省科技发展计划(2013GGX10116) 山东省自然科学基金项目(ZR2013FM013)
关键词 起源 访问控制 PBAC RBAC 依赖关系列表 PROV provenance access control PBAC RBAC dependency list PROV
  • 相关文献

参考文献12

  • 1Nguyen D,Park J,Sandhu R.Integrated provenance data for access control in group-centric collaboration. Information Reuse and Integration (IRI),2012IEEE 13th International Conference on . 2012
  • 2Jaehong Park,Dang Nguyen,Sandhu R.A provenance-based access control model. Privacy, Security and Trust PST . 2012
  • 3Sandhu, R.S.,Coyne, E.J.,Feinstein, H.L.,Youman, C.E.Role-based access control models. Computer . 1996
  • 4S.M. Iftekharul Alam,Sonia Fahmy.??A practical approach for provenance transmission in wireless sensor networks(J)Ad Hoc Networks . 2013
  • 5Souley Madougou,Shayan Shahand,Mark Santcroos,Barbera van Schaik,Ammar Benabdelkader,Antoine van Kampen,Sílvia Olabarriaga.??Characterizing workflow-based activity on a production e-infrastructure using provenance data(J)Future Generation Computer Systems . 2013 (8)
  • 6刘通,王凤英.基于OPM的安全起源模型[J].计算机应用研究,2013,30(10):3117-3120. 被引量:7
  • 7Girish S. Joglekar,Arun Giridhar,Gintaras Reklaitis.??A workflow modeling system for capturing data provenance(J)Computers and Chemical Engineering . 2014
  • 8Jin Li,Xiaofeng Chen,Qiong Huang,Duncan S. Wong.??Digital provenance: Enabling secure data forensics in cloud computing(J)Future Generation Computer Systems . 2013
  • 9Cadenhead T,Khadilkar V,Kantarcioglu M,et al.A language for provenance access control. Proceedings of therst ACM conference on Data and application security and privacy . 2011
  • 10Moreau L,Missier P.PROV-DM:The PROV Data Model. http://www.w3.org/TR/REC-prov-dm-20130430/ . 2013

二级参考文献9

  • 1李亚子.数据起源标注模式与描述模型[J].现代图书情报技术,2007(7):10-13. 被引量:16
  • 2IKEDA R, WIDOM J. Panda: a system for provenance and data[ J].IEEE Data Engineering Bulletin,2010,33(3) :l-4.
  • 3SELTZER M, BRAUN U, LEDLIE J,e( al. Provenance-aware storagesystems[ C]//Proc of USENIX Annual Technical Conference. 2006.
  • 4HASAN R,SION R,WINSLETT M. The case of the fake picasso:pre-venting history forgery with secure provenance [ C] //Proc of the 7 thUSENIX Conference on File and Storage Technologies. [ S. 1.] : USE-NIX Association,2009.
  • 5ALDECO-PEREZ R,MOREAU L. Securing provenance-based audits[C] //Proc of the 3rd International Provenance and Annotation Work-shop. Berlin : Springer, 2010 : 148-164.
  • 6MOREAU L, CLIFFORD B, FREIRE],et al. The open provenancemodel core specification(vl. 1) [J]. Future Generation ComputerSystems, 2011,27(6) :743-756.
  • 7CHAUM D,HEYST E V. Group signatures[ C]//Proc of the 10th An-nual International Conference on Theory and Application of Crypto-graphic Techniques. Berlin : Springer-Verlag ,1991:257-265.
  • 8李秀美,王凤英.数据起源安全模型研究[J].山东理工大学学报(自然科学版),2010,24(4):56-60. 被引量:17
  • 9戴超凡,王涛,张鹏程.数据起源技术发展研究综述[J].计算机应用研究,2010,27(9):3215-3221. 被引量:39

共引文献6

同被引文献14

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部