期刊文献+

安全管理系统中基于角色访问控制的实施方法 被引量:21

Practical way to implement role-based access control in security administration system
下载PDF
导出
摘要 对典型的基于角色的访问控制模型(RBAC)作了扩展,研究了如何从现实世界获取有用信息来构造RBAC、如何实施RBAC、如何进行安全管理等问题.提出了实施RBAC的安全管理系统的三层体系结构,并给出了在三层体系结构上实施RBAC的方法.通过把网络作为一个整体,在安全管理系统中实现了基于角色的访问控制,以及实现了跨平台的基于角色的安全管理的系统化和自动化. The traditional role-based access control (RBAC) model was extended for studying practical ways to implement access control, enforce security administration, and acquire available information from real world to construct an access control model and establish security policies. A three-layered architecture for role-based security administration was proposed. And a practical way was presented to implement role-based access control and role-based security administration, so that cross-platform role-based access control is implemented automatically and systematically in the security administration system.
出处 《浙江大学学报(工学版)》 EI CAS CSCD 北大核心 2004年第4期408-413,共6页 Journal of Zhejiang University:Engineering Science
基金 浙江省自然科学基金资助项目(600014) 浙江省重大科技计划资助项目(1101104).
  • 相关文献

参考文献12

  • 1杨亚平,李伟琴,刘怀宇.基于角色的细粒度访问控制系统的研究与实现[J].北京航空航天大学学报,2001,27(2):178-181. 被引量:27
  • 2SANDHU R S,COYNC E J,FCINSTCIN H L,et al.Role-based access control model [J]. IEEE Computer,1996,29(2) :38-47.
  • 3SANDHU R S,FERRAIOLO D,KUHN R. The NIST model for role-based access control: Towards a unified standard[A]. Proceedings of the Fifth ACM Workshop on Role Based Access Control [C]. Berlin, Germany:ACM, 2000: 47- 63.
  • 4訾小超,张绍莲,茅兵,谢立.访问控制技术的研究和进展[J].计算机科学,2001,28(7):26-28. 被引量:15
  • 5JAEGER T,GIRAUD F,ISLAM N ,et al. A role-based access control model for protection domain derivation and management. [A] Proceedings of the Second ACM Workshop on Role-Based Access Control[C]. Fairfax,Virginia ,USA ..ACM, 1997: 95- 108.
  • 6EPSTEIN P,SANDHU R S. Towards a UML based approach to role engineering [A]. Proceedings of the Fourth ACM Workshop on Role-Based Access Control[C]. Fairfax, Virginia, USA: ACM, 19 9 9: 135 - 143.
  • 7SANDHU RAVI S,BHAMIDIPATI V,COYNE E,et al. The ARBAC97 model for role-based administration of roles: Preliminary description and outline[A]. Proceedings of the Second ACM Workshop on Role-Based Access Control [C]. Fairfax, Virginia, USA: ACM,1997: 41-50.
  • 8SANDHU RAVI S,MUNAWER Q. The ARBAC99model for administration of roles [A]. Proceedings 15th Annual Computer Security Applications Conference [C]. Phoenix,Arizona,USA: IEEE Computer Society,1999: 229-238.
  • 9FERNANDEZ E B,HAWKINS J C. Determining role rights from use casesIn[A]. Proceedings of the SecondACM Workshop on Role-Based Access Control [C].Fairfax,Virginia, USA: ACM, 1997: 121 - 126.
  • 10李成锴,dislab.nju.edu.cn,詹永照,茅兵,谢立.基于角色的CSCW系统访问控制模型[J].软件学报,2000,11(7):931-937. 被引量:55

二级参考文献11

  • 1刘怀宇.基于角色的细粒度的访问控制系统的研究与实现[M].北京:北京航空航天大学计算机科学与工程系,1999..
  • 2Chang C C,Inform Sci,1997年,96卷,1-2期,15页
  • 3Hw ang M S,Computers Security,1996年,15卷,1期,73页
  • 4Hw ang M S,IEICE Trans Inf Syst,1994年,77卷,9期,1042页
  • 5Hwang J J,Computer J,1992年,35卷,1期,16页
  • 6Zahir T,IEEE Internet Computing,1997年,1卷,5期,24页
  • 7茅兵,中国科学.E,1997年,27卷,6期,542页
  • 8Shen Honghai,Proceedings of thACMCSCW’92 Conference on Computer Supported Cooperative Work,1994年,51页
  • 9陈爱民,计算机的安全与保密,1992年,141页
  • 10刘怀宇,学位论文,1999年

共引文献152

同被引文献95

引证文献21

二级引证文献67

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部