期刊文献+
共找到618篇文章
< 1 2 31 >
每页显示 20 50 100
Permission and role automatic assigning of user in role-based access control 被引量:4
1
作者 韩道军 卓汉逵 +1 位作者 夏兰亭 李磊 《Journal of Central South University》 SCIE EI CAS 2012年第4期1049-1056,共8页
Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and th... Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and the operating process is complex.A new role analyzing method was proposed by generating mappings and using them to provide recommendation for systems.The relation among sets of permissions,roles and users was explored by generating mappings,and the relation between sets of users and attributes was analyzed by means of the concept lattice model,generating a critical mapping between the attribute and permission sets,and making the meaning of the role natural and operational.Thus,a role is determined by permission set and user's attributes.The generated mappings were used to automatically assign permissions and roles to new users.Experimental results show that the proposed algorithm is effective and efficient. 展开更多
关键词 role-based access control ROLE permission assignment concept lattice
下载PDF
校园网中的Role-based Access Control模型设计 被引量:2
2
作者 王新月 《计算机与现代化》 2004年第3期54-57,共4页
介绍了如何将Role basedAccessControl(RBAC)模型应用于校园网的访问控制系统中。其特点是通过分配和取消角色来完成用户权限的授予和取消 ,并且提供了角色分配规则和操作检查规则。安全管理人员根据需要定义各种角色 ,并设置合适的访... 介绍了如何将Role basedAccessControl(RBAC)模型应用于校园网的访问控制系统中。其特点是通过分配和取消角色来完成用户权限的授予和取消 ,并且提供了角色分配规则和操作检查规则。安全管理人员根据需要定义各种角色 ,并设置合适的访问权限 ,而用户根据其责任和资历被指派为不同的角色。根据系统的实际需求 。 展开更多
关键词 校园网 role-based access control模型 设计 访问控制系统 角色分配规则
下载PDF
A General Attribute and Rule Based Role-Based Access Control Model
3
作者 朱一群 李建华 张全海 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第6期719-724,共6页
Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource.This paper analyzes the relatio... Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource.This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments. 展开更多
关键词 ATTRIBUTE RULE user-role ASSIGNMENT role-based access control(rbac) access policy
下载PDF
A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure
4
作者 ZHANG Shaomin WANG Baoyi ZHOU Lihua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1827-1830,共4页
PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer ... PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC (Role-based Access control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is deseribed in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also. 展开更多
关键词 access control rbacrole-based access controd TRUST CACHE PMI (privilege management infrastructure)
下载PDF
Centralized Role-Based Access Control for Federated Multi-Domain Environments
5
作者 YU Guangcan LU Zhengding +1 位作者 LI Ruixuan MUDAR Sarem 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1688-1692,共5页
The secure interaction among multiple security domains is a major concern. In this paper, we highlight the issues of secure interoperability among multiple security domains operating under the widely accepted Role Bas... The secure interaction among multiple security domains is a major concern. In this paper, we highlight the issues of secure interoperability among multiple security domains operating under the widely accepted Role Based Access Control (RBAC) model. We propose a model called CRBAC that easily establishes a global policy for roles mapping among multiple security domains. Our model is based on an extension of the RBAC model. Also, multiple security domains were composed to one abstract security domain. Also roles in the multiple domains are translated to permissions of roles in the abstract security domain. These permissions keep theirs hierarchies. The roles in the abstract security domain implement roles mapping among the multiple security domains. Then, authorized users of any security domain can transparently access resources in the multiple domains. 展开更多
关键词 rbac(role based access control federated MULTI-DOMAIN
下载PDF
Dynamically Authorized Role-Based Access Control for Grid Applications
6
作者 YAO Hanbing HU Heping LU Zhengding LI Ruixuan 《Geo-Spatial Information Science》 2006年第3期223-228,233,共7页
Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed “virtual organizations”. The heterogeneous, dynamic and multi-domain nature of these environments makes challengin... Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed “virtual organizations”. The heterogeneous, dynamic and multi-domain nature of these environments makes challenging security issues that demand new technical approaches. Despite the recent advances in access control approaches applicable to Grid computing, there remain issues that impede the development of effective access control models for Grid applications. Among them there are the lack of context-based models for access control, and reliance on identity or capability-based access control schemes. An access control scheme that resolve these issues is presented, and a dynamically authorized role-based access control (D-RBAC) model extending the RBAC with context constraints is proposed. The D-RABC mechanisms dynamically grant permissions to users based on a set of contextual information collected from the system and user’s environments, while retaining the advantages of RBAC model. The implementation architecture of D-RBAC for the Grid application is also described. 展开更多
关键词 Grid security rbac context-based access control
下载PDF
基于RBAC模型的前后端分离系统设计与实现 被引量:2
7
作者 陈海锋 丘美玲 《科技创新与应用》 2024年第4期102-105,109,共5页
权限管理是现代信息管理系统核心功能之一,能够让用户可以安全访问系统数据,其中基于角色的访问控制模型是常用的一种权限管理模型,其优点是能够灵活地处理角色与权限之间的变化问题,为复杂的权限管理问题提供便利性。另一方面前后端分... 权限管理是现代信息管理系统核心功能之一,能够让用户可以安全访问系统数据,其中基于角色的访问控制模型是常用的一种权限管理模型,其优点是能够灵活地处理角色与权限之间的变化问题,为复杂的权限管理问题提供便利性。另一方面前后端分离技术能够很好地解决前端页面开发和后端服务器功能开发解耦的问题,让分工双方更加注重各自面对的业务问题,减少对开发人员技术门槛的要求,从而大大提高了开发效率。因此采用前后端分离技术实现通用的基于角色的访问控制系统具有一定的实用价值。 展开更多
关键词 基于角色的访问控制模型 前后端分离 访问控制 系统设计 数据库
下载PDF
Attribute-based access control policy specification language 被引量:6
8
作者 叶春晓 钟将 冯永 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期260-263,共4页
This paper first introduces attribute expression to describe attribute-based access control policy.Secondly,an access control policy enforcement language named A-XACML (attribute-XACML)is proposed,which is an extens... This paper first introduces attribute expression to describe attribute-based access control policy.Secondly,an access control policy enforcement language named A-XACML (attribute-XACML)is proposed,which is an extension of XACML.A-XACML is used as a simple,flexible way to express and enforce access control policies,especially attribute-based access control policy,in a variety of environments.The language and schema support include data types,functions,and combining logic which allow simple and complex policies to be defined.Finally,a system architecture and application case of user-role assignment is given to show how attribute expressions and A-XACML work in access control policy description and enforcement.The case shows that attribute expression and A-XACML can describe and enforce the complex access control policy in a simple and flexible way. 展开更多
关键词 role-based access control POLICY XML XACML
下载PDF
A New Role Hierarchy Model for Role Based Access Control 被引量:2
9
作者 吕宜洪 宋瀚涛 龚元明 《Journal of Beijing Institute of Technology》 EI CAS 2002年第4期409-413,共5页
A new role hierarchy model for RBAC (role-based access control) is presented and its features are illustrated through examples. Some new concepts such as private permission, public permission and special permission ar... A new role hierarchy model for RBAC (role-based access control) is presented and its features are illustrated through examples. Some new concepts such as private permission, public permission and special permission are introduced, based on the RRA97 model. Some new role-role inheriting forms such as normal inheritance, private inheritance, public inheritance and special-without inheritance are defined. Based on the ideas mentioned, the new role hierarchy model is formulated. It is easier and more comprehensible to describe role-role relationships through the new model than through the traditional ones. The new model is closer to the real world and its mechanism is more powerful. Particularly it is more suitable when used in large-scale role hierarchies. 展开更多
关键词 rbac access control ROLE INHERIT role hierarchy
下载PDF
基于T-RBAC访问控制模型在实习管理云平台中的应用研究 被引量:1
10
作者 张林静 刘淑影 尤游 《黄山学院学报》 2023年第3期26-29,共4页
虚拟化技术虽然促进了云计算技术的不断发展,同时也对云计算安全产生了新的威胁。实习管理云平台可提供多租户访问,然而多点访问策略也增加了云平台的安全隐患。基于任务-角色的访问控制模型T-RBAC可以实现静态-动态相结合分级访问,对... 虚拟化技术虽然促进了云计算技术的不断发展,同时也对云计算安全产生了新的威胁。实习管理云平台可提供多租户访问,然而多点访问策略也增加了云平台的安全隐患。基于任务-角色的访问控制模型T-RBAC可以实现静态-动态相结合分级访问,对不同访问主体采用不同的访问控制策略。将该模型应用在实习管理云平台的开发设计中,通过设置用户访问策略,有效地提升了云平台管理的灵活性,保障了实习管理云平台数据资源的安全性。 展开更多
关键词 访问控制 云计算 T-rbac
下载PDF
基于RBAC模型的网络安全访问控制系统 被引量:1
11
作者 喻燕华 《信息与电脑》 2023年第3期120-122,共3页
为缩短网络安全访问控制系统的响应时间,设计了一种基于角色的访问控制(Role-BasedAccess Control,RBAC)模型的网络安全访问控制系统。通过网关设备采用树莓派,外网设备采用路由器完成系统硬件设计。通过设计RBAC模型的知识库、基于RBA... 为缩短网络安全访问控制系统的响应时间,设计了一种基于角色的访问控制(Role-BasedAccess Control,RBAC)模型的网络安全访问控制系统。通过网关设备采用树莓派,外网设备采用路由器完成系统硬件设计。通过设计RBAC模型的知识库、基于RBAC模型的身份认证功能、用户信任值评估功能完成系统软件设计。仿真实验结果表明,当并发用户数量为10 000时,本文设计的网络安全访问控制系统的平均响应时间为1.38 s,工作效率较好,具有一定的应用价值。 展开更多
关键词 基于角色的访问控制(rbac)模型 网络安全 访问控制 系统设计
下载PDF
Design and Implementation of File Access and Control System Based on Dynamic Web 被引量:3
12
作者 GAO Fuxiang YAO Lan BAO Shengfei YU Ge 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1233-1237,共5页
A dynamic Web application, which can help the departments of enterprise to collaborate with each other conveniently, is proposed. Several popular design solutions are introduced at first. Then, dynamic Web system is c... A dynamic Web application, which can help the departments of enterprise to collaborate with each other conveniently, is proposed. Several popular design solutions are introduced at first. Then, dynamic Web system is chosen for developing the file access and control system. Finally, the paper gives the detailed process of the design and implementation of the system, which includes some key problems such as solutions of document management and system security. Additionally, the limitations of the system as well as the suggestions of further improvement are also explained. 展开更多
关键词 file access and control ACTIVEX role based access control (rbac VERSION
下载PDF
Review of Access Control Model 被引量:3
13
作者 Zhengtao Liu Wen Gu Jinyue Xia 《Journal of Cyber Security》 2019年第1期43-50,共8页
Access control is one of the core problems in data management system.In this paper,the system requirements were described in three aspects:the traditional access control model,the access control model in the Internet ... Access control is one of the core problems in data management system.In this paper,the system requirements were described in three aspects:the traditional access control model,the access control model in the Internet era and the access control model in the cloud computing environment.Meanwhile,the corresponding major models were listed and their characteristics and problems were analyzed.Finally,the development trend of the corresponding model was proposed. 展开更多
关键词 access control rbac ABAC cloud computing
下载PDF
An Extended Role Based Access Control Method for XML Documents
14
作者 MENGXiao-feng LUODao-feng OUJian-bo 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期740-744,共5页
As XML has been increasingly important as the Data-change format of Internet and Intranet, access-control-on-XML-properties rises as a new issue. Role-based access control (RBAC) is an access control method that has b... As XML has been increasingly important as the Data-change format of Internet and Intranet, access-control-on-XML-properties rises as a new issue. Role-based access control (RBAC) is an access control method that has been widely used in Internet, Operation System and Relation Data Base these 10 years. Though RBAC is already relatively mature in the above fields, new problems occur when it is used in XML properties. This paper proposes an integrated model to resolve these problems, after the fully analysis on the features of XML and RBAC. Key words XML - RBAC - access control method - RBAC CLC number TP 309 Foundation item: This Research was Partially Supported by the Grants from 863 High Technology Foundation of China (2002AA116030), the National Natural Science Foundation of China (60073014, 60273018), the Key Project of Chinese Ministry of Education (03044) and the Excellent Young Teachers Program of M0E, P.R.C (EYTP)Biography: MENG Xiao-feng (1964-), male, Professor, Ph. D, research direction: web information integration, XML database, mobile database. 展开更多
关键词 XML rbac access control method rbac
下载PDF
Design and Implementation of Linux Access Control Model
15
作者 Wei Xiaomeng Wu Yongbin +2 位作者 Zhuo Jingchuan Wang Jianyun Haliqian Mayibula 《Meteorological and Environmental Research》 CAS 2017年第4期81-83,共3页
In this paper,the design and implementation of an access control model for Linux system are discussed in detail. The design is based on the RBAC model and combines with the inherent characteristics of the Linux system... In this paper,the design and implementation of an access control model for Linux system are discussed in detail. The design is based on the RBAC model and combines with the inherent characteristics of the Linux system,and the support for the process and role transition is added.The core idea of the model is that the file is divided into different categories,and access authority of every category is distributed to several roles.Then,roles are assigned to users of the system,and the role of the user can be transited from one to another by running the executable file. 展开更多
关键词 ROLE BASED access control LINUX rbac
下载PDF
The Research of Role Tree-Based Access Control Model
16
作者 陆虹 夏天 《Journal of Donghua University(English Edition)》 EI CAS 2010年第2期274-276,共3页
Towards the crossing and coupling permissions in tasks existed widely in many fields and considering the design of role view must rely on the activities of the tasks process,based on Role Based Accessing Control (RBAC... Towards the crossing and coupling permissions in tasks existed widely in many fields and considering the design of role view must rely on the activities of the tasks process,based on Role Based Accessing Control (RBAC) model,this paper put forward a Role Tree-Based Access Control (RTBAC) model. In addition,the model definition and its constraint formal description is also discussed in this paper. RTBAC model is able to realize the dynamic organizing,self-determination and convenience of the design of role view,and guarantee the least role permission when task separating in the mean time. 展开更多
关键词 Role Based accessing control (rbac Role Tree-Based access control (RTBAC) Models Constraints Permission
下载PDF
面向广域测量系统的RBAC扩展模型研究 被引量:2
17
作者 许斌斌 黄均才 《电工技术》 2023年第9期57-60,共4页
广域测量系统WAMS(Wide Area Measurement System)是新一代智能电网的重要组成部分,访问控制对于维护WAMS的系统安全十分重要。针对传统RBAC模型在复杂业务权限控制中的不足及WAMS中设备的特点,引入了被访问对象类型的属性和权限约束模... 广域测量系统WAMS(Wide Area Measurement System)是新一代智能电网的重要组成部分,访问控制对于维护WAMS的系统安全十分重要。针对传统RBAC模型在复杂业务权限控制中的不足及WAMS中设备的特点,引入了被访问对象类型的属性和权限约束模块,对传统的RBAC模型进行改进。该模型使WAMS的访问控制更加灵活,角色管理更加方便。 展开更多
关键词 广域测量系统 角色访问控制模型 访问控制
下载PDF
基于RBAC的汽车企业通用权限管理系统设计
18
作者 苏德 韦统边 +2 位作者 吴江波 韦通明 张亮 《汽车电器》 2023年第7期48-50,54,共4页
权限管理是信息管理系统不可或缺的一部分,其核心内容是访问控制,为整个系统的信息安全提供重要的保障机制。本文采用目前最为广泛使用的RBAC模型,提出一套适合于汽车企业的通用权限管理系统设计方案,主要从设计原则、基本功能模块介绍... 权限管理是信息管理系统不可或缺的一部分,其核心内容是访问控制,为整个系统的信息安全提供重要的保障机制。本文采用目前最为广泛使用的RBAC模型,提出一套适合于汽车企业的通用权限管理系统设计方案,主要从设计原则、基本功能模块介绍、系统设计与实现等3个方面对该系统的建设思路进行综合阐述。 展开更多
关键词 权限管理 访问控制 rbac 建设思路
下载PDF
基于RBAC的IPv6环境网络信息安全访问控制方法
19
作者 李程 《通信电源技术》 2023年第22期194-196,共3页
常规的互联网协议第6版(Internet Protocol version 6,IPv6)环境网络信息安全访问控制方法主要使用ReliefF算法获取最优特征集合,易受访问约束限制影响,导致安全访问控制延时过高。针对此问题,利用基于角色的控制访问(Role-Based Access... 常规的互联网协议第6版(Internet Protocol version 6,IPv6)环境网络信息安全访问控制方法主要使用ReliefF算法获取最优特征集合,易受访问约束限制影响,导致安全访问控制延时过高。针对此问题,利用基于角色的控制访问(Role-Based Access Control,RBAC)方法设计一种全新的IPv6环境网络信息安全访问控制方法。构建了IPv6环境网络信息安全访问控制模型,利用RBAC生成了网络信息安全访问控制关系,实现了网络信息安全访问控制。实验结果表明,所设计的基于RBAC的IPv6环境网络信息安全访问控制方法的访问控制延时相对较低,证明设计的环境网络信息安全访问的控制效果较好,具有可靠性,有一定的应用价值,为降低IPv6环境网络风险做出了一定的贡献。 展开更多
关键词 基于角色的控制访问(rbac) 互联网协议第6版(IPv6) 信息安全 访问控制
下载PDF
RBAC中权限扩展的实现 被引量:27
20
作者 叶春晓 符云清 吴中福 《计算机工程》 EI CAS CSCD 北大核心 2005年第9期141-142,172,共3页
针对RBAC以访问控制主体为中心,较少关注访问控制客体,造成了在权限设置和管理过程中工作量较大的问题,提出了对权限进行相应扩展的方法。该方法将权限分为操作和操作所针对的数据对象,提出了操作继承和数据对象继承概念,并在此基础上... 针对RBAC以访问控制主体为中心,较少关注访问控制客体,造成了在权限设置和管理过程中工作量较大的问题,提出了对权限进行相应扩展的方法。该方法将权限分为操作和操作所针对的数据对象,提出了操作继承和数据对象继承概念,并在此基础上提出了权限继承概念。给出了具体的应用例子,表明该方法在权限设置和管理过程中将大大减少系统安全管理人员的工作量。 展开更多
关键词 访问控制 rbac 权限
下载PDF
上一页 1 2 31 下一页 到第
使用帮助 返回顶部