期刊文献+

角色指派的时间描述 被引量:3

Periodicity descmption of user-role assignment
下载PDF
导出
摘要 用户角色指派关系是基于角色的访问控制系统中的核心关系之一,用户角色指派关系的定义方法对整个系统的访问控制性能具有直接的影响。本文使用时间特性描述了用户角色指派关系,使用户在系统中的活动具有严格的时间约束,提高了系统的安全性。 User-Role Assignment(URA)is one of the core relations in role-based access control system.The mode of defining User-Role Assignment is a key to a successful access control system.This paper describes URA by using temporal method.It provides time constraint to user's activites in role-based system,therefore,raised the system security.
出处 《西安邮电学院学报》 2004年第1期41-43,共3页 Journal of Xi'an Institute of Posts and Telecommunications
关键词 基于角色访问控制 用户角色指派 时间特性 TRBAC role-based access control user-role assignment periodicity
  • 相关文献

参考文献4

  • 1[1]R.Sandhu.Role-Based Access Control[EB/OL].September 17,1997.http://www.list.gmu.edu.
  • 2[2]F.Ferraiolo,R.Sandhu,S.Gavrila,R.Kuhn and R.Chandramouli.Proposed NIST Standard for Role-Based Access Control[J].Transactions on Information and Systems Security,Volume 4,Number 3/August 2001.
  • 3[3]E.Bertino,C.Bettini,E.Ferrari and P.Samarati.An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning[J].Transactions on Database Systems,1998,23(3):231-285.
  • 4[4]E.Bertino,P.Bonattie and E.Ferrari.TRBAC:A Temporal Role-Based Access Control Model[J].Transactions on Information and System Security,2001,4(3):191-223.

同被引文献10

  • 1江华.一种带时间和空间约束的角色授权管理模型[J].计算机工程,2004,30(15):106-107. 被引量:1
  • 2李芳,范玉妹,胡志兴.操作系统安全模型研究及方案设计[J].微计算机信息,2004,20(9):126-128. 被引量:10
  • 3洪帆,饶双宜,段素娟.基于属性的权限—角色分配模型[J].计算机应用,2004,24(B12):153-155. 被引量:6
  • 4杨秋伟,洪帆,杨木祥,朱贤.基于角色访问控制管理模型的安全性分析[J].软件学报,2006,17(8):1804-1810. 被引量:38
  • 5[1]M.Al-Kahtani and R.Sandhu.A Model for Attribute-Based User-RoleAssignment[J]In Proceedings of the 18th Annual Computer SecurityApplications Conference,Las Vegas,Nevada,December 9-13,2002.
  • 6[2]M.Al-Kahtani and R.Sandhu.Induced Role Hierarchies with Attribute-Based RBAC[J]In Proceedings of the 8th ACM Symposium on AccessControl Models and Technologies(SACMAT),Villa Gallia,Como,Italy,June2-3,2003.
  • 7[3]C.Bettini,S.Jajodia,X.S.Wang,and D.Wijesekera.Provisions andObligations in Policy Management and Security Applications[J]InProceedings of the 28th VLDB conference,Hong Kong,China,2002.
  • 8Al - Kahtani M, Sandhu R. A Model for attribute - based user - role assignment[ C ]//Proceedings of the 18th Annual Computer Security Applications Conference. Las Vegas: Nevada,2002:9 - 13.
  • 9Al - Kahtani M, Sandhu R. Induced role hierarchies with attribute - based RBAC [ C ]//Proceedings of the 8th ACM Symposium on AceessControl Models and Technologies (SACMAT). Villa Gallia: Como, 2003 : 142 - 148.
  • 10赵庆松,孙玉芳,孙波.基于系统先决条件的授权模型研究[J].计算机研究与发展,2003,40(3):406-412. 被引量:4

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部