期刊文献+

基于角色的CSC W系统安全模型 被引量:1

The security model of CSCW system based on RBAC
下载PDF
导出
摘要 针对计算机支持的协同系统用户多 ,权限关系复杂 ,组织机构规模大的特点 ,给出了基于角色的访问控制在CSCW中的安全模型 .该模型通过RBAC提供的安全策略和协同工作策略实现了CSCW系统的安全机制 .研究表明 ,该模型描述简单 ,易于管理 ,能很好地将RBAC和CSCW系统对安全和协同工作的需求结合起来 . Aimed at the characteristics of CSCW systems involving a large number of users, complicated property relationship and large-scale organizations, a security model was presented based on RBAC theory. The model implemented the security mechanism of CSCW system according to security policy and cooperative policy provided by RBAC. It was shown that the model was easy to describe and manage, and could combine the RBAC with the security and cooperative requirements of CSCW system.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2004年第5期56-58,共3页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
关键词 基于角色的访问控制 计算机支持的协同工作 安全策略 协同策略 role-based access control computer supported cooperative work security policy cooperative policy
  • 相关文献

参考文献3

  • 1史美林 杨光信.计算机支持的协同工作:过去、现在和未来[J].计算机研究与发展,1999,36(7):149-154.
  • 2Sandhu R S, Coyne E J, Feinstein H L, et al. Role-based access control models. IEEE Computer, 1996, 29(2): 38~48
  • 3Foley S, Jacob J. Specifying security for computer supported collaborative computing. Journal of Computer Security, 1995, 3(4): 233~253

共引文献6

同被引文献7

  • 1龚能,李玉顺,史美林.协作环境中的关键技术研究[J].计算机科学,2005,32(9):230-233. 被引量:10
  • 2张志勇,普杰信.异构分布式CSCW委托授权模型及其访问控制[J].计算机工程,2006,32(12):71-73. 被引量:5
  • 3Sandhu R, Zhang Xinwen, Ranganatham Kumar, et al. Client-side access control enforcement using trusted computing and PEI models[J]. Journal of High Speed Network, 2006(15): 229-245.
  • 4Zhu Haibin. Some issues of role-based collaboration [C] // Proceedings of IEEE Canadian Conference on Electrical and Computer Engineering. Montreal: Institute of Electrical and Electronics Engineers Inc, 2003 : 687-690.
  • 5Zhu Haibin. Conflict resolution with roles in a collaborative system[J]. International Journal of Intelligent Control and Systems, 2005, 10(1): 11-20.
  • 6Smith S W. Trusted computing platforms: design and applications. Boston: Springer, 2005.
  • 7李成锴,dislab.nju.edu.cn,詹永照,茅兵,谢立.基于角色的CSCW系统访问控制模型[J].软件学报,2000,11(7):931-937. 被引量:55

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部