Access control in multi-domain environments is an important question in building coalition between domains. Based on the RBAC access control model and the concepts of secure domain, the role delegation and role mappin...Access control in multi-domain environments is an important question in building coalition between domains. Based on the RBAC access control model and the concepts of secure domain, the role delegation and role mapping are proposed, which support the third-party authorization. A distributed RBAC model is then presented. Finally implementation issues are discussed.展开更多
While Role-Based Access Control Model (RBAC) is being analyzed, the concept of Role of Time-domain Based Access Control Model (T-RBAC) is put forward. With time-domain added, both time-domain and authority control rol...While Role-Based Access Control Model (RBAC) is being analyzed, the concept of Role of Time-domain Based Access Control Model (T-RBAC) is put forward. With time-domain added, both time-domain and authority control roles. The basic idea of T-RBAC is introduced and described formally, and the safely of this model is analyzed. The research shows that T-RBAC fulfills both rules of information security, which are principle of least privilege and separation of duties. With practical application of T-RBCA, it can handle most of the time-related or authority-related problems. What’s more, it also increases the security level, flexibility and dynamic adaptation of the system and has lower complexity than system only handled by authority. This model also can solve conflicts caused by authority.展开更多
The secure interaction among multiple security domains is a major concern. In this paper, we highlight the issues of secure interoperability among multiple security domains operating under the widely accepted Role Bas...The secure interaction among multiple security domains is a major concern. In this paper, we highlight the issues of secure interoperability among multiple security domains operating under the widely accepted Role Based Access Control (RBAC) model. We propose a model called CRBAC that easily establishes a global policy for roles mapping among multiple security domains. Our model is based on an extension of the RBAC model. Also, multiple security domains were composed to one abstract security domain. Also roles in the multiple domains are translated to permissions of roles in the abstract security domain. These permissions keep theirs hierarchies. The roles in the abstract security domain implement roles mapping among the multiple security domains. Then, authorized users of any security domain can transparently access resources in the multiple domains.展开更多
In our changing health care system, the role of registered nurses (RNs) has become indistinguishable from other nursing and health care providers’ roles. The purpose of this research was to explore the perspectives o...In our changing health care system, the role of registered nurses (RNs) has become indistinguishable from other nursing and health care providers’ roles. The purpose of this research was to explore the perspectives of nurse leaders and direct care RNs about the existing and future RN scope of practice. This research used an interpretive description analysis on data that was garnered from nurse leaders and RNs through separate focus groups. Participants identified existing threats to their roles, examined their scope of practice and proposed changes to the RN scope of practice. Specific areas that were identified included leadership, advocacy and expansion of RNs practices were dominant themes.展开更多
ARBAC97模型、ARBAC02模型和Crampton-Loizou模型是重要的RBAC管理模型,然而,这三个模型存在着一些必须被改进的问题.作者提出管理权域的概念,基于它提出RBAC层次管理模型(HARBAC,the hierarchical administration model for RBAC),并将...ARBAC97模型、ARBAC02模型和Crampton-Loizou模型是重要的RBAC管理模型,然而,这三个模型存在着一些必须被改进的问题.作者提出管理权域的概念,基于它提出RBAC层次管理模型(HARBAC,the hierarchical administration model for RBAC),并将HARBAC模型与前面三个模型进行对比,新模型具有显著的管理优势.展开更多
多信任域间的安全访问是一项重要的研究内容。结合基于角色访问控制机制(RBAC)的优势及现有的跨域认证技术构建了一种适用于大规模分布式网络环境的跨信任域授权管理CTDPM(Crossing the Trusted-domain Privilege Management)模型。模...多信任域间的安全访问是一项重要的研究内容。结合基于角色访问控制机制(RBAC)的优势及现有的跨域认证技术构建了一种适用于大规模分布式网络环境的跨信任域授权管理CTDPM(Crossing the Trusted-domain Privilege Management)模型。模型中提出角色推荐和单向角色映射策略,支持分布式环境下任意两个信任域之间的安全访问。运用集合论和谓词逻辑对CTDPM模型进行了系统的形式化描述,提出了一套合理的授权与安全规则,并进行了特性分析,最后给出该模型在访问控制系统中的安全应用。展开更多
文摘Access control in multi-domain environments is an important question in building coalition between domains. Based on the RBAC access control model and the concepts of secure domain, the role delegation and role mapping are proposed, which support the third-party authorization. A distributed RBAC model is then presented. Finally implementation issues are discussed.
文摘While Role-Based Access Control Model (RBAC) is being analyzed, the concept of Role of Time-domain Based Access Control Model (T-RBAC) is put forward. With time-domain added, both time-domain and authority control roles. The basic idea of T-RBAC is introduced and described formally, and the safely of this model is analyzed. The research shows that T-RBAC fulfills both rules of information security, which are principle of least privilege and separation of duties. With practical application of T-RBCA, it can handle most of the time-related or authority-related problems. What’s more, it also increases the security level, flexibility and dynamic adaptation of the system and has lower complexity than system only handled by authority. This model also can solve conflicts caused by authority.
基金Supported by the National Natural Science Foun-dation of China(60403027) the Natural Science Foundation of HubeiProvince(2005ABA258) the Open Foundation of State Key Labo-ratory of Software Engineering(SKLSE05-07)
文摘The secure interaction among multiple security domains is a major concern. In this paper, we highlight the issues of secure interoperability among multiple security domains operating under the widely accepted Role Based Access Control (RBAC) model. We propose a model called CRBAC that easily establishes a global policy for roles mapping among multiple security domains. Our model is based on an extension of the RBAC model. Also, multiple security domains were composed to one abstract security domain. Also roles in the multiple domains are translated to permissions of roles in the abstract security domain. These permissions keep theirs hierarchies. The roles in the abstract security domain implement roles mapping among the multiple security domains. Then, authorized users of any security domain can transparently access resources in the multiple domains.
文摘In our changing health care system, the role of registered nurses (RNs) has become indistinguishable from other nursing and health care providers’ roles. The purpose of this research was to explore the perspectives of nurse leaders and direct care RNs about the existing and future RN scope of practice. This research used an interpretive description analysis on data that was garnered from nurse leaders and RNs through separate focus groups. Participants identified existing threats to their roles, examined their scope of practice and proposed changes to the RN scope of practice. Specific areas that were identified included leadership, advocacy and expansion of RNs practices were dominant themes.
文摘ARBAC97模型、ARBAC02模型和Crampton-Loizou模型是重要的RBAC管理模型,然而,这三个模型存在着一些必须被改进的问题.作者提出管理权域的概念,基于它提出RBAC层次管理模型(HARBAC,the hierarchical administration model for RBAC),并将HARBAC模型与前面三个模型进行对比,新模型具有显著的管理优势.
文摘多信任域间的安全访问是一项重要的研究内容。结合基于角色访问控制机制(RBAC)的优势及现有的跨域认证技术构建了一种适用于大规模分布式网络环境的跨信任域授权管理CTDPM(Crossing the Trusted-domain Privilege Management)模型。模型中提出角色推荐和单向角色映射策略,支持分布式环境下任意两个信任域之间的安全访问。运用集合论和谓词逻辑对CTDPM模型进行了系统的形式化描述,提出了一套合理的授权与安全规则,并进行了特性分析,最后给出该模型在访问控制系统中的安全应用。