期刊文献+

基于Petri网的RBAC策略验证的研究 被引量:5

Research on Verification of RBAC Policies Based on Petri-net
下载PDF
导出
摘要 本文为 RBAC模型提出了一个基于着色 Petri网的策略规格说明和分析的架构 .Petri网能够捕获基数、责任分离等约束 ,而且能对优先和依赖约束进行说明 .使用 Petri网的可达到性分析技术对 RBAC策略进行正确性验证 . The crucial issue of verification of role based access control policies has not been adequately investigated. In this paper, we develop a colored Petri net based policy specification and analysis framework for an RBAC model. The Petri net model can capture all the cardinality and separation of duty constraints. Moreover, the model also allows specification of the precedence and dependency constraints. We use the Petri net reachability analysis technique for verifying correctness of RBAC policies.
出处 《小型微型计算机系统》 CSCD 北大核心 2004年第5期827-832,共6页 Journal of Chinese Computer Systems
关键词 PETRI网 RBAC 策略 验证 Petri-net RBAC policy verification
  • 相关文献

参考文献13

  • 1Bertino E, Bonatti P A, Ferrari E. TRBAC: A temporal rolebased access control model[J]. ACM Transactions on Information and System Security, August 2001,4(3) : 191-233.
  • 2Ahn G, Sandhu R. Role-based authorization constraints specification[J]. ACM Transactions on Information and System Security, November 2000,3(4):207 - 226.
  • 3Ferraiolo D F, Sandhu R, Gavrila S, Kuhn D R, Chandramouli R. Proposed NIST standard for role-based access control [J].ACM Transactions on Information and System Security (TISSEC) 2001, 4(3), August 224 - 274.
  • 4Jensen K. Coloured petri nets: basic concepts, analysis methods and practical use[M], Volume 1, Springer Verlag, 1997.
  • 5Joshi J BD, Bertino E, Ghafoor A. Temporal hierarchies and inheritance semantics for GTRBAC[C]. Seventh ACM Symposium on Access Control Models and Technologies, June 2002, 74-83.
  • 6Nyanchama M and Osborn S. The role graph model and conflict of interest [J]. ACM Transactions on Information and System Security, 1999, 2(1):3-33.
  • 7Koch M, Mancini L V, Parisi-Presicce F. A Graph-based formalism for RBAC[J]. ACM Transactions on Information and System Security (TISSEC) August 2002, 5(3):332 - 365.
  • 8Jaeger T, Tidswell J E. Practical safety in flexible access control models[J]. ACM Transactions on Information System Security,May 2001,4(2):158 - 190.
  • 9Gavrila S I, Barkley J F. Formal specification for role based access control user/role and role/role relationship management [C]. Proceedings of the third ACM workshop on Role-based access control, Fairfax, Virginia, United States. October 22-23,1998, 81
  • 10Sandhu R, Coyne E J, Feinstein H L, Youman C E. Role-Based access control models [J]. IEEE Computer IEEE Press, 1996, 29(2):38-47.

共引文献1

同被引文献25

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部