期刊文献+

若干安全操作系统中的基于角色的访问控制特性 被引量:5

Role-Based Access Control Features in Secure Operating Systems
下载PDF
导出
摘要 文章分析比较了三个安全操作系统对基于角色的访问控制(RBAC)特性的支持,分别是:TrustedSolaris8操作环境,Secure-EnhancedLinux和红旗安全操作系统。这里把RBAC特性概括为三点:用户和角色的关联、支持角色间层次和限制关系、可关联的特权。虽然三个系统都提供了对RBAC基本特性的支持,但在实现方法上不尽相同。TrustedSolaris只允许用户拥有一个活动角色,而SELinux和RFSOS支持用户的多个活动角色。三者都实现了角色间的层次关系,TrustedSolaris和SELinux只支持角色间的动态冲突关系,只有RFSOS既支持角色间的静态冲突又支持动态冲突。 This paper analyzes and compares Role-Base Access Control(RBAC)features supported in three secure op-erating systems :Trusted Solaris8Operating Environment ,Security-Enhanced Linux and RedFlag Secure Operating Sys-tem.We categorize RBAC features under three broad areas:user role assignment ,support for role relationships and con-straints,and assignable privileges.Our finding is that these products provide a sound basis for implementing the basic features of RBAC,although there are significant differences.In particular,Trusted Solaris restricts users to a single active role at any time ,while SELinux and RFSOS allow multiple roles to be activated simultaneously as the user's selection.All three provide support for role hierarchies.Trusted Solaris and SELinux support dynamic separation of duties,while RFSOS is the only one to support both of static and dynamic separation of duties.
作者 刘伟 孙玉芳
出处 《计算机工程与应用》 CSCD 北大核心 2004年第4期41-44,共4页 Computer Engineering and Applications
基金 国家自然科学基金项目(编号:60073022) 国家863高科技研究发展计划项目(编号:863-306-ZD 12-14-2) 中国科学院知识创新工程(编号:KGCX1-09)
关键词 基于角色的访问控制 安全操作系统 静态冲突 动态冲突 Role-Based Access Control(RBAC),Secure Operating System,Static separaction,Dynamic separation
  • 相关文献

参考文献2

二级参考文献81

  • 1McLean J. Security Models and Information Flow. In:IEEE Symposium on Security and Privacy, pp. 180-189.
  • 2Ferraiolo D, Cugini J, Kuhn D R. Role Based Access Control: Features and Motivations. In Annual Computer Security Applications Conf IEEE Computer Society Press, 1995.
  • 3Ferraiolo D,Kuhn D R. Role Based Access Control. In:the Proc of the 15th National Computer Security Conf. Vol Ⅱ ,1992. 554-563.
  • 4RBAC in the Solaris [tm] Operating Environment. wwws. sun.com/soft ware/whitepapers/wp-rbac /.
  • 5Chandramouli R,Sandu R. Role Based Access Control Features in Commercial Database Management Systems. In: 21^st National Information Systems Security Conf. Oct. 1998.
  • 6Sandhu R S, Coyne E J, Feinstein H L, Youman C E. Role-based access control models. IEEE Computer, 1996,29(2) : 38-47.
  • 7Sandhu R S, Coyne E J, Feinsten H L, Youman C E. Role-Based Access Control: A Multi-Dimensional View. In:Proc of 10^th Annual Computer Security Applications Conf. 1994.54-62.
  • 8Jansen W A. A Revised Model for Role Based Access Control. NIST-IR 6192, July 1998.
  • 9Gavrila, Barkley. Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management. In: Third ACM Workshop on Role-Based Access Control.
  • 10Kühnhauser W E. On Paradigms for User-Defined Security Policies in Multipolicy Environments. In:11th IFIP Intl. Information Security Conf. , Cape Town, 1995

共引文献31

同被引文献30

  • 1徐晓涛,洪帆.办公自动化系统中基于RBAC的授权模型[J].通信技术,2003,36(4):87-89. 被引量:4
  • 2李军,孙玉方.计算机安全和安全模型[J].计算机研究与发展,1996,33(4):312-320. 被引量:28
  • 3张朝清,王非非.SELinux系统中可扩展强制访问控制的实现[J].现代计算机,2006,12(6):25-27. 被引量:2
  • 4National Security Agency.SELinux[EB/OL].http://www.nsa.gov/selinux/.
  • 5DoD 5200.25-STD,Department of Defense Standard,Department of Defense Trusted Computer System Evaluation Criteria[S].1995.
  • 6Huang Xian-zhi,Wang Hai-yang,Chen Zhen-xiang,et al.A context,rule and role-based access control model in enterprise pervasive computing environment[C]//2006 1st International Symposium on Pervasive Computing and Applications,Shandong University,2006.
  • 7Chen Xiao-su,Lin Zhi.Policy-based access control model for mobile agent system[C]//Wireless Communications,Networking and Mobile Computing, 2006.
  • 8Srivatsa M,Iyengar A.An access control system for Web service compositions[C]//IEEE International Conference on Web Services 2007, ICWS 2007,2007.
  • 9Bell D E,LaPadula L J.Secure computer systems:mathematical foundations and model,M74-244m[R].The MITRE Corporation, Bedford, MA, 1973.
  • 10Biba K.Integrity considerations for secure computer systems,MTR- 3153[R].MITRE Corporation, Bedford, MA, 1977.

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部