期刊文献+

大型应用系统用户权限构成分析及访问控制策略研究 被引量:9

User Permission Analysis and Access Control Tactics in Large-scale Applications
下载PDF
导出
摘要 通过一个大型公文流转系统的实例 (中国政府机关公文流转系统 ) ,研究和探讨实际应用中的用户权限及访问控制问题 .我们认为 ,基于大型应用中用户权限的构成特点只采用基于角色的访问控制策略是不够的 ,必须也要采用传统的其它访问控制机制才能实现完善的访问控制系统 .但究竟如何实现这种综合访问控制 ,目前很少有这方面的文章和研究 .本文通过实例系统在对大型应用系统中用户的权限构成进行分析后 ,重点介绍了系统综合访问控制实现的基本结构、控制策略、管理方法 ,并就几个关键问题进行了讨论 . Through an example system, The official documents run system for government organizations of china, the issues about user permissions and access control tactics in large-scale applications are discussed. And we thought that because of the complexity of permission requirements, just using role-based access control policy is not enough, and it is absolutely necessary to adopt traditional access control mechanisms in practices. But how to achieve the integrated access control policy in large-scale systems, there have been no more articles concerning it up to now. After the user permission analysis, well introduce the basic structure of the access system, the control policy, the management method and the weakness also in our example system.
出处 《小型微型计算机系统》 CSCD 北大核心 2004年第2期195-198,共4页 Journal of Chinese Computer Systems
基金 首都信息化重点工程项目"北京市技术监督局信息化建设专项资金"资助 (1999)
关键词 访问控制 角色 权限 应用 公文 access control role permission application official document
  • 相关文献

参考文献10

  • 1[1]Ravi Sandhu, E. Coyne, H. Feinstein and C. Youman.Role-based access control model[J]. IEEE Computer,Feb. 1996,29(2):38~47.
  • 2[2]Ravi Sandhu & David Ferraiolo.The NIST Model for role-based access control: towards a unified standard[S]. 5st ACM Workshop on RBAC, 2000:47~63.
  • 3[3]Michael J. Covington. Generalized role-based access control for securing future applications[C]. National Information Systems Security Conference, 2000.
  • 4[4]Tidswell J and Potter J. A dynamically typed access control model[C]. Third Australian Conference on Information Security and Privacy, July 1998,308~319.
  • 5[5]Glenn Faden. RBAC in UNIX administration[C]. 4th ACM Role-Based Access Control Workshop, 1999,95~101.
  • 6[6]Michael J, Swift M. Improving the granularity of access control in Windows NT[C]. Sixth ACM Symposium on Access control models and technologies, May 2001,87~96.
  • 7[7]Andreas Schaad, Jonathan Moffett and Jeremy Jacob. The role-based access control system of a European bank[C]. Sixth ACM workshop on SACMAT.2001,3~9.
  • 8[8]Ravi Sandhu, Qamar Munawer, How to do discretionary access control using roles[C]. 3th ACM workshop on RBAC.1998,47~54.
  • 9[9]Sylvia Osborn. Mandatory access control and role-based access control revisited[C]. Proceedings of the Second ACM Workshop on RBAC, 1997,31~40.
  • 10[10]Ravi Sandhu and Venkata Bhamidipati. An oracle implementation of the PRA97 model for permission-role assignment[C]. Third ACM Workshop on RBAC,1998:13~21.

同被引文献44

引证文献9

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部