期刊文献+

一个应用于操作系统的RBAC模型及其实施 被引量:11

An Operating System Oriented RBAC Model and Its Implementation
下载PDF
导出
摘要 主要研究了经典角色访问控制模型面向操作系统的扩展及其在内核中的实施方法 首先在RBAC96模型的基础上 ,引入可执行文件实体、细分操作系统权限 ,形成适用于操作系统的角色访问控制模型OSR(operatingsystemorient edRBACmodel)并给出简单的形式化描述 然后 。 The construction and implementation of an operating system oriented RBAC model are discussed in this paper. Firstly, on the basis of the RBAC96 model, a new RBAC model named “OSR” is presented and formalized by adding executable-file component and subdividing permission component. Secondly, the OSR model is enforced in the secure Linux kernel by integrating the GFAC method and capability mechanism together.
出处 《计算机研究与发展》 EI CSCD 北大核心 2004年第2期287-298,共12页 Journal of Computer Research and Development
基金 国家自然科学基金项目 (60 0 73 0 2 2 ) 国家"八六三"高技术研究发展计划项目 (863 3 0 6 ZD12 14 2 ) 中国科学院知识创新工程基金项目 (KGCX 1 0 9) 北京市重点技术创新项目 中国科学院软件研究所培育基金项目 (CXKE5 14 3 )
关键词 操作系统 RBAC 访问控制 operating system RBAC access control
  • 相关文献

参考文献25

  • 1D F Ferraiolo, R Kuhn. Role-based access control. The 15th National Computer Security Conf, Baltimore, MD, 1992. http://hissa.ncsl.nist.gov/kuhn
  • 2R S Sandhu et al. Role-based access control models. IEEE Computer, 1996, 29(2): 38~47
  • 3P Loscocco et al.The Inevitability of failure: The flawed assumption of security in modern computing environments, national security agency. The 21st National Information Systems Security Conf, Virginia, USA, 1997
  • 4David F Ferraiolo. An argument for the role-based access control model. The 6th ACM Symp on Access Control Models and Technologies, Chantilly, Virginia, USA, 2001
  • 5R Sandhu, P Samarati. Access control: Principles and practice. IEEE Communications, 1994, 32(9): 40~48
  • 6Feustel, Mayfield. The DGSA: Unmet information security challenges for operating system designers. Operating Systems Review, 1998, 32(1): 3~22
  • 7Research Challenges in Operating System Security, Arlington, Hilton: DARPA/ISO. 1997. http://www.ito.arpa.mil/Proceedings/OS_Security/challenges/challenges_long.html
  • 8J H Saltzer, M Schroeder. The protection and control of information sharing in multics. Communications of the ACM, 1974, 17(7): 388~402
  • 9J Hoffman. Implementing RBAC on type enforced systems. In: Proc of the 13th Annual Computer Security Applications Conf. San Diego, CA: IEEE Computer Society Press, 1997
  • 10查义国,徐小岩,张毓森.在Web上实现基于角色的访问控制[J].计算机研究与发展,2002,39(3):257-263. 被引量:19

二级参考文献15

  • 1林东.网络信息安全&PGP加密[M].北京:清华大学出版社,1998..
  • 21,Ferraiolo D F, Kuhn R. Role-Based access control. In: Proceedings of the 15th National Computer Security Conference. Baltimore, MD, 1992. 554~563, http://hissa.ncsl.nist.gov/kuhn/
  • 32,Sandhu R, Samarati P. Access control: principles and practice. IEEE Communications, 1994,32(9):40~48
  • 43,Ramaswamy C, Sandhu R. Role-Based access control features in commercial database management systems. In: Proceedings of the 21st National Information Systems Security Conference. Virginia: U.S. Government Printing Office, 1998, http://www.list.gmu.edu/conferen.htm
  • 54,Sandhu R, Coyne E J, Feinstein H L et al. Role-Based access control models. IEEE Computers, 1996,29(2):38~47
  • 65 Sandhu R. Rationale for the RBAC96 family of access control models. In: Proceedings of the 1st ACM Workshop on Role-Based Access Control. ACM, 1997. http://www.list.gmu.edu/conferen.htm
  • 7Chang C C,Inform Sci,1997年,96卷,1-2期,15页
  • 8Hw ang M S,Computers Security,1996年,15卷,1期,73页
  • 9Hw ang M S,IEICE Trans Inf Syst,1994年,77卷,9期,1042页
  • 10Hwang J J,Computer J,1992年,35卷,1期,16页

共引文献225

同被引文献84

引证文献11

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部