期刊文献+

基于角色访问控制模型及其在操作系统中的实现 被引量:9

Role-Based Access Control Model and its Implementation in Operating System
下载PDF
导出
摘要 Since Role-based access control shows great advantage in meeting the security need in large-scale, enter-prise-wide system, RBAC becomes the hot topic in access control research area. Researchers have proposed severalRBAC models, which include the famous RBAC96 model. However, these frameworks are sometimes hard for sys-tem developers to understand because the models defined are too abstract or focus on application-oriented solutions.In this paper, a new model (OSRBAC)is discussed, which is the improved model to RBAC3 model in RBAC96 modelfamily. Compared with RBAC3 model, OSRBAC model is more concrete and easilier to understand. At the end, thispaper describes the implementation of OSRBAC model in RedFlag Secure Operating System(RFSOS). Since Role-based access control shows great advantage in meeting the security need in large-scale, enterprise-wide system, RBAC becomes the hot topic in access control research area. Researchers have proposed several RBAC models, which include the famous RBAC96 model. However, these frameworks are sometimes hard for system developers to understand because the models defined are too abstract or focus on application-oriented solutions. In this paper, a new model (OSRBAOis discussed, which is the improved model to RBAC3 model in RBAC96 model family. Compared with RBAC3 model, OSRBAC model is more concrete and easilier to understand. At the end, this paper describes the implementation of OSRBAC model in RedFlag Secure Operating System (RFSOS).
作者 刘伟 孙玉芳
出处 《计算机科学》 CSCD 北大核心 2003年第8期166-168,共3页 Computer Science
关键词 操作系统 角色访问控制模型 RBAC3模型 计算机系统 RBAC, Role, Access control, Secure operating system
  • 相关文献

参考文献9

  • 1McLean J. Security Models and Information Flow. In:IEEE Symposium on Security and Privacy, pp. 180-189.
  • 2Ferraiolo D, Cugini J, Kuhn D R. Role Based Access Control: Features and Motivations. In Annual Computer Security Applications Conf IEEE Computer Society Press, 1995.
  • 3Ferraiolo D,Kuhn D R. Role Based Access Control. In:the Proc of the 15th National Computer Security Conf. Vol Ⅱ ,1992. 554-563.
  • 4RBAC in the Solaris [tm] Operating Environment. wwws. sun.com/soft ware/whitepapers/wp-rbac /.
  • 5Chandramouli R,Sandu R. Role Based Access Control Features in Commercial Database Management Systems. In: 21^st National Information Systems Security Conf. Oct. 1998.
  • 6Sandhu R S, Coyne E J, Feinstein H L, Youman C E. Role-based access control models. IEEE Computer, 1996,29(2) : 38-47.
  • 7Sandhu R S, Coyne E J, Feinsten H L, Youman C E. Role-Based Access Control: A Multi-Dimensional View. In:Proc of 10^th Annual Computer Security Applications Conf. 1994.54-62.
  • 8Jansen W A. A Revised Model for Role Based Access Control. NIST-IR 6192, July 1998.
  • 9Gavrila, Barkley. Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management. In: Third ACM Workshop on Role-Based Access Control.

同被引文献55

引证文献9

二级引证文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部