期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Role based access control design using Triadic concept analysis 被引量:9
1
作者 Ch.Aswani Kumar S.Chandra Mouliswaran +1 位作者 LI Jin-hai C.Chandrasekar 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第12期3183-3191,共9页
Role based access control is one of the widely used access control models.There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis(FCA),description logics... Role based access control is one of the widely used access control models.There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis(FCA),description logics,and Ontology for representing access control mechanism.However,while using FCA,investigations reported in the literature so far work on the logic that transforms the three dimensional access control matrix into dyadic formal contexts.This transformation is mainly to derive the formal concepts,lattice structure and implications to represent role hierarchy and constraints of RBAC.In this work,we propose a methodology that models RBAC using triadic FCA without transforming the triadic access control matrix into dyadic formal contexts.Our discussion is on two lines of inquiry.We present how triadic FCA can provide a suitable representation of RBAC policy and we demonstrate how this representation follows role hierarchy and constraints of RBAC on sample healthcare network available in the literature. 展开更多
关键词 access control concept lattice role based access control role hierarchy triadic context triadic concept analysis
下载PDF
Consistency maintenance for constraint in role-based access control model 被引量:3
2
作者 韩伟力 陈刚 +1 位作者 尹建伟 董金祥 《Journal of Zhejiang University Science》 CSCD 2002年第3期292-297,共6页
Constraint is an important aspect of role based access control and is sometimes argued to be the principal motivation for role based access control (RBAC). But so far few authors have discussed consistency maintenan... Constraint is an important aspect of role based access control and is sometimes argued to be the principal motivation for role based access control (RBAC). But so far few authors have discussed consistency maintenance for constraint in RBAC model. Based on researches of constraints among roles and types of inconsistency among constraints, this paper introduces corresponding formal rules, rule based reasoning and corresponding methods to detect, avoid and resolve these inconsistencies. Finally, the paper introduces briefly the application of consistency maintenance in ZD PDM, an enterprise oriented product data management (PDM) system. 展开更多
关键词 Consistency maintenance role based access control Product data management CONSTRAINT
下载PDF
Two Different Role Division Control Strategies for Torque and Axial Force of Conical Bearingless Switched Reluctance Motor 被引量:1
3
作者 HAO Zhenyang MIAO Wei +1 位作者 CAO Xin ZHANG Qiyao 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2020年第6期848-857,共10页
Although the five-degree-of-freedom magnetic levitation system composed of two conical bearingless switched reluctance motors(CBSRMs)owns the simplest structure,the torque and levitation forces are coupled greatly.The... Although the five-degree-of-freedom magnetic levitation system composed of two conical bearingless switched reluctance motors(CBSRMs)owns the simplest structure,the torque and levitation forces are coupled greatly.Therefore,it is difficult to make the rotor rotate and be fully levitated simultaneously.To solve this problem,two different role division control strategies are proposed in this paper,i.e.individual role division and mutual role division control strategies.The difference between them is the selection of motor which controls the torque or the axial force.In order to understand the characteristics of control variables,the principle and mathematical model of CBSRM are introduced.After that,two control strategies are explained in detail.To verify the demonstrated performance,the simulations are completed with MATLAB/Simulink. 展开更多
关键词 five-degree-of-freedom magnetic levitation conical bearingless switched reluctance motor(CBSRM) individual role division control mutual role division control
下载PDF
Centralized Role-Based Access Control for Federated Multi-Domain Environments
4
作者 YU Guangcan LU Zhengding +1 位作者 LI Ruixuan MUDAR Sarem 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1688-1692,共5页
The secure interaction among multiple security domains is a major concern. In this paper, we highlight the issues of secure interoperability among multiple security domains operating under the widely accepted Role Bas... The secure interaction among multiple security domains is a major concern. In this paper, we highlight the issues of secure interoperability among multiple security domains operating under the widely accepted Role Based Access Control (RBAC) model. We propose a model called CRBAC that easily establishes a global policy for roles mapping among multiple security domains. Our model is based on an extension of the RBAC model. Also, multiple security domains were composed to one abstract security domain. Also roles in the multiple domains are translated to permissions of roles in the abstract security domain. These permissions keep theirs hierarchies. The roles in the abstract security domain implement roles mapping among the multiple security domains. Then, authorized users of any security domain can transparently access resources in the multiple domains. 展开更多
关键词 RBAC(role based access control) federated MULTI-DOMAIN
下载PDF
The Research of Role Tree-Based Access Control Model
5
作者 陆虹 夏天 《Journal of Donghua University(English Edition)》 EI CAS 2010年第2期274-276,共3页
Towards the crossing and coupling permissions in tasks existed widely in many fields and considering the design of role view must rely on the activities of the tasks process,based on Role Based Accessing Control (RBAC... Towards the crossing and coupling permissions in tasks existed widely in many fields and considering the design of role view must rely on the activities of the tasks process,based on Role Based Accessing Control (RBAC) model,this paper put forward a Role Tree-Based Access Control (RTBAC) model. In addition,the model definition and its constraint formal description is also discussed in this paper. RTBAC model is able to realize the dynamic organizing,self-determination and convenience of the design of role view,and guarantee the least role permission when task separating in the mean time. 展开更多
关键词 role Based Accessing Control (RBAC) role Tree-Based Access Control (RTBAC) Models Constraints Permission
下载PDF
Design and Implementation of File Access and Control System Based on Dynamic Web 被引量:3
6
作者 GAO Fuxiang YAO Lan BAO Shengfei YU Ge 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1233-1237,共5页
A dynamic Web application, which can help the departments of enterprise to collaborate with each other conveniently, is proposed. Several popular design solutions are introduced at first. Then, dynamic Web system is c... A dynamic Web application, which can help the departments of enterprise to collaborate with each other conveniently, is proposed. Several popular design solutions are introduced at first. Then, dynamic Web system is chosen for developing the file access and control system. Finally, the paper gives the detailed process of the design and implementation of the system, which includes some key problems such as solutions of document management and system security. Additionally, the limitations of the system as well as the suggestions of further improvement are also explained. 展开更多
关键词 file access and control ACTIVEX role based access control (RBAC) VERSION
下载PDF
PBRRI: A Hybrid Peer-to-Peer Communication Model in Distributed Systems
7
作者 张亚英 尤晋元 《Journal of Shanghai Jiaotong university(Science)》 EI 2003年第2期128-132,共5页
In distributed systems independent agents need to interact with each other to accomplish their task. Modern peer-to-peer computing technologies always concern with enabling interaction among agents and help them coope... In distributed systems independent agents need to interact with each other to accomplish their task. Modern peer-to-peer computing technologies always concern with enabling interaction among agents and help them cooperate with each other. But in fact, access control should also be considered to limit interaction to make it harmless. This paper proposed a proxy based rule regulated interaction (PBRRI) model. Role based access control is introduced for security concerns. Regulation rules are enforced in a distributed manner so that PBRRI can be applied to the open distributed systems such as Internet. 展开更多
关键词 PEER-TO-PEER interaction rules regulation GROUP role based access control
下载PDF
Visualization Framework for Inter-Domain Access Control Policy Integration
8
作者 潘理 柳宁 訾小超 《China Communications》 SCIE CSCD 2013年第3期67-75,共9页
The rapid increase in resource sharing across domains in the cloud comput- ing environment makes the task of managing inter-domain access control policy integration difficult for the security administrators. Al- thoug... The rapid increase in resource sharing across domains in the cloud comput- ing environment makes the task of managing inter-domain access control policy integration difficult for the security administrators. Al- though a number of policy integration and sec- urity analysis mechanisms have been devel- oped, few focus on enabling the average ad- ministrator by providing an intuitive cognitive sense about the integrated policies, which considerably undermines the usability factor. In this paper we propose a visualization flame- work for inter-domain access control policy integration, which integrates Role Based Ac- cess Control (RBAC) policies on the basis of role-mapping and then visualizes the inte- grated result. The role mapping algorithm in the framework considers the hybrid role hier- archy. It can not only satisfy the security con- straints of non-cyclic inheritance and separa- tion of duty but also make visualization easier. The framework uses role-permission trees and semantic substrates to visualize the integrated policies. Through the interactive policy query visualization, the average administrator can gain an intuitive understanding of the policy integration result. 展开更多
关键词 policy visualization policy integration role based access control role mapping
下载PDF
A dominant role of internal climate variability in controlling Atlantic multidecadal variability during the past 1200 years
9
《Science Foundation in China》 CAS 2017年第3期44-44,共1页
Subject Code:D02With the support by the National Natural Science Foundation of China,a collaborative study by the research group led by Prof.Yang Bao(杨保)from the Key Laboratory of Desert and Desertification,Northwes... Subject Code:D02With the support by the National Natural Science Foundation of China,a collaborative study by the research group led by Prof.Yang Bao(杨保)from the Key Laboratory of Desert and Desertification,Northwest Institute of Eco-Environment and Resources of the Chinese Academy of Sciences,and 展开更多
关键词 A dominant role of internal climate variability in controlling Atlantic multidecadal variability during the past 1200 years
原文传递
Minimal role mining method for Web service composition
10
作者 Chao HUANG Jian-ling SUN Xin-yu WANG Yuan-jie SI 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2010年第5期328-339,共12页
Web service composition is a low cost and efficient way to leverage the existing resource and implementation.In current Web service composition implementations,the issue of how to define the role for a new composite W... Web service composition is a low cost and efficient way to leverage the existing resource and implementation.In current Web service composition implementations,the issue of how to define the role for a new composite Web service has been little addressed.Adjusting the access control policy for a new composite Web service always causes substantial administration overhead from the security administrator.Furthermore,the distributed nature of Web service based applications makes traditional role mining methods obsolete.In this paper,we analyze the minimal role mining problem for Web service composition,and prove that this problem is NP-complete.We propose a sub-optimal greedy algorithm based on the analysis of necessary role mapping for interoperation across multiple domains.Simulation shows the effectiveness of our algorithm,and compared to the existing methods,our algorithm has significant performance advantages.We also demonstrate the practical application of our method in a real agent based Web service system.The results show that our method could find the minimal role mapping efficiently. 展开更多
关键词 Web service composition role base access control(RBAC) role mining Access control policy role mapping Web service security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部