期刊文献+
共找到760篇文章
< 1 2 38 >
每页显示 20 50 100
A New Role Hierarchy Model for Role Based Access Control 被引量:2
1
作者 吕宜洪 宋瀚涛 龚元明 《Journal of Beijing Institute of Technology》 EI CAS 2002年第4期409-413,共5页
A new role hierarchy model for RBAC (role-based access control) is presented and its features are illustrated through examples. Some new concepts such as private permission, public permission and special permission ar... A new role hierarchy model for RBAC (role-based access control) is presented and its features are illustrated through examples. Some new concepts such as private permission, public permission and special permission are introduced, based on the RRA97 model. Some new role-role inheriting forms such as normal inheritance, private inheritance, public inheritance and special-without inheritance are defined. Based on the ideas mentioned, the new role hierarchy model is formulated. It is easier and more comprehensible to describe role-role relationships through the new model than through the traditional ones. The new model is closer to the real world and its mechanism is more powerful. Particularly it is more suitable when used in large-scale role hierarchies. 展开更多
关键词 rbac access control role INHERIT role hierarchy
下载PDF
基于RBAC模型的前后端分离系统设计与实现 被引量:1
2
作者 陈海锋 丘美玲 《科技创新与应用》 2024年第4期102-105,109,共5页
权限管理是现代信息管理系统核心功能之一,能够让用户可以安全访问系统数据,其中基于角色的访问控制模型是常用的一种权限管理模型,其优点是能够灵活地处理角色与权限之间的变化问题,为复杂的权限管理问题提供便利性。另一方面前后端分... 权限管理是现代信息管理系统核心功能之一,能够让用户可以安全访问系统数据,其中基于角色的访问控制模型是常用的一种权限管理模型,其优点是能够灵活地处理角色与权限之间的变化问题,为复杂的权限管理问题提供便利性。另一方面前后端分离技术能够很好地解决前端页面开发和后端服务器功能开发解耦的问题,让分工双方更加注重各自面对的业务问题,减少对开发人员技术门槛的要求,从而大大提高了开发效率。因此采用前后端分离技术实现通用的基于角色的访问控制系统具有一定的实用价值。 展开更多
关键词 基于角色的访问控制模型 前后端分离 访问控制 系统设计 数据库
下载PDF
Role based access control design using Triadic concept analysis 被引量:9
3
作者 Ch.Aswani Kumar S.Chandra Mouliswaran +1 位作者 LI Jin-hai C.Chandrasekar 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第12期3183-3191,共9页
Role based access control is one of the widely used access control models.There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis(FCA),description logics... Role based access control is one of the widely used access control models.There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis(FCA),description logics,and Ontology for representing access control mechanism.However,while using FCA,investigations reported in the literature so far work on the logic that transforms the three dimensional access control matrix into dyadic formal contexts.This transformation is mainly to derive the formal concepts,lattice structure and implications to represent role hierarchy and constraints of RBAC.In this work,we propose a methodology that models RBAC using triadic FCA without transforming the triadic access control matrix into dyadic formal contexts.Our discussion is on two lines of inquiry.We present how triadic FCA can provide a suitable representation of RBAC policy and we demonstrate how this representation follows role hierarchy and constraints of RBAC on sample healthcare network available in the literature. 展开更多
关键词 access control concept lattice role based access control role hierarchy triadic context triadic concept analysis
下载PDF
Consistency maintenance for constraint in role-based access control model 被引量:3
4
作者 韩伟力 陈刚 +1 位作者 尹建伟 董金祥 《Journal of Zhejiang University Science》 CSCD 2002年第3期292-297,共6页
Constraint is an important aspect of role based access control and is sometimes argued to be the principal motivation for role based access control (RBAC). But so far few authors have discussed consistency maintenan... Constraint is an important aspect of role based access control and is sometimes argued to be the principal motivation for role based access control (RBAC). But so far few authors have discussed consistency maintenance for constraint in RBAC model. Based on researches of constraints among roles and types of inconsistency among constraints, this paper introduces corresponding formal rules, rule based reasoning and corresponding methods to detect, avoid and resolve these inconsistencies. Finally, the paper introduces briefly the application of consistency maintenance in ZD PDM, an enterprise oriented product data management (PDM) system. 展开更多
关键词 Consistency maintenance role based access control Product data management CONSTRAINT
下载PDF
An Efficient Role and Object Based Access Control Model Implemented in a PDM System
5
作者 HUANG Xiaowen TAN Jian HUANG Xiangguo School of Mechantronic Engineering,Wuhan University of Technology,Wuhan 430070,China, 《武汉理工大学学报》 CAS CSCD 北大核心 2006年第S3期788-791,共4页
An effective and reliable access control is crucial to a PDM system.This article has discussed the commonly used access control models,analyzed their advantages and disadvantages,and proposed a new Role and Object bas... An effective and reliable access control is crucial to a PDM system.This article has discussed the commonly used access control models,analyzed their advantages and disadvantages,and proposed a new Role and Object based access control model that suits the particular needs of a PDM system.The new model has been implemented in a commercial PDM system,which has demonstrated enhanced flexibility and convenience. 展开更多
关键词 PDM MANDATORY access CONTROL discretionary access CONTROL role based access CONTROL
下载PDF
Centralized Role-Based Access Control for Federated Multi-Domain Environments
6
作者 YU Guangcan LU Zhengding +1 位作者 LI Ruixuan MUDAR Sarem 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1688-1692,共5页
The secure interaction among multiple security domains is a major concern. In this paper, we highlight the issues of secure interoperability among multiple security domains operating under the widely accepted Role Bas... The secure interaction among multiple security domains is a major concern. In this paper, we highlight the issues of secure interoperability among multiple security domains operating under the widely accepted Role Based Access Control (RBAC) model. We propose a model called CRBAC that easily establishes a global policy for roles mapping among multiple security domains. Our model is based on an extension of the RBAC model. Also, multiple security domains were composed to one abstract security domain. Also roles in the multiple domains are translated to permissions of roles in the abstract security domain. These permissions keep theirs hierarchies. The roles in the abstract security domain implement roles mapping among the multiple security domains. Then, authorized users of any security domain can transparently access resources in the multiple domains. 展开更多
关键词 rbacrole based access control) federated MULTI-DOMAIN
下载PDF
A General Attribute and Rule Based Role-Based Access Control Model
7
作者 朱一群 李建华 张全海 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第6期719-724,共6页
Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource.This paper analyzes the relatio... Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource.This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments. 展开更多
关键词 ATTRIBUTE RULE user-role ASSIGNMENT role-based access control(rbac) access policy
下载PDF
A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure
8
作者 ZHANG Shaomin WANG Baoyi ZHOU Lihua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1827-1830,共4页
PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer ... PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC (Role-based Access control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is deseribed in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also. 展开更多
关键词 access control rbacrole-based access controd TRUST CACHE PMI (privilege management infrastructure)
下载PDF
The Research of Role Tree-Based Access Control Model
9
作者 陆虹 夏天 《Journal of Donghua University(English Edition)》 EI CAS 2010年第2期274-276,共3页
Towards the crossing and coupling permissions in tasks existed widely in many fields and considering the design of role view must rely on the activities of the tasks process,based on Role Based Accessing Control (RBAC... Towards the crossing and coupling permissions in tasks existed widely in many fields and considering the design of role view must rely on the activities of the tasks process,based on Role Based Accessing Control (RBAC) model,this paper put forward a Role Tree-Based Access Control (RTBAC) model. In addition,the model definition and its constraint formal description is also discussed in this paper. RTBAC model is able to realize the dynamic organizing,self-determination and convenience of the design of role view,and guarantee the least role permission when task separating in the mean time. 展开更多
关键词 role based accessing Control rbac role Tree-based access Control (RTBAC) Models Constraints Permission
下载PDF
基于RBAC模型的网络安全访问控制系统 被引量:1
10
作者 喻燕华 《信息与电脑》 2023年第3期120-122,共3页
为缩短网络安全访问控制系统的响应时间,设计了一种基于角色的访问控制(Role-BasedAccess Control,RBAC)模型的网络安全访问控制系统。通过网关设备采用树莓派,外网设备采用路由器完成系统硬件设计。通过设计RBAC模型的知识库、基于RBA... 为缩短网络安全访问控制系统的响应时间,设计了一种基于角色的访问控制(Role-BasedAccess Control,RBAC)模型的网络安全访问控制系统。通过网关设备采用树莓派,外网设备采用路由器完成系统硬件设计。通过设计RBAC模型的知识库、基于RBAC模型的身份认证功能、用户信任值评估功能完成系统软件设计。仿真实验结果表明,当并发用户数量为10 000时,本文设计的网络安全访问控制系统的平均响应时间为1.38 s,工作效率较好,具有一定的应用价值。 展开更多
关键词 基于角色的访问控制(rbac)模型 网络安全 访问控制 系统设计
下载PDF
Design and Implementation of File Access and Control System Based on Dynamic Web 被引量:3
11
作者 GAO Fuxiang YAO Lan BAO Shengfei YU Ge 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1233-1237,共5页
A dynamic Web application, which can help the departments of enterprise to collaborate with each other conveniently, is proposed. Several popular design solutions are introduced at first. Then, dynamic Web system is c... A dynamic Web application, which can help the departments of enterprise to collaborate with each other conveniently, is proposed. Several popular design solutions are introduced at first. Then, dynamic Web system is chosen for developing the file access and control system. Finally, the paper gives the detailed process of the design and implementation of the system, which includes some key problems such as solutions of document management and system security. Additionally, the limitations of the system as well as the suggestions of further improvement are also explained. 展开更多
关键词 file access and control ACTIVEX role based access control rbac VERSION
下载PDF
General Attribute Based RBAC Model for Web Services 被引量:3
12
作者 ZHU Yiqun LI Jianhua ZHANG Quanhai 《Wuhan University Journal of Natural Sciences》 CAS 2008年第1期81-86,共6页
Growing numbers of users and many access policies that involve many different resource attributes in service-oriented environments cause various problems in protecting resource. This paper analyzes the relationships o... Growing numbers of users and many access policies that involve many different resource attributes in service-oriented environments cause various problems in protecting resource. This paper analyzes the relationships of resource attributes to user attributes based on access policies for Web services, and proposes a general attribute based role-based access control(GARBAC) model. The model introduces the notions of single attribute expression, composite attribute expression, and composition permission, defines a set of elements and relations among its elements and makes a set of rules, assigns roles to user by inputing user's attributes values. The model is a general access control model, can support more granularity resource information and rich access control policies, also can be used to wider application for services. The paper also describes how to use the GARBAC model in Web services environments. 展开更多
关键词 ATTRIBUTE RULE user-role assignment role-based access control rbac access policy
下载PDF
Least Privileges and Role’s Inheritance of RBAC 被引量:3
13
作者 HAN Lan-sheng HONG Fan Asiedu Baffour Kojo 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期185-187,共3页
The main advantages of role-based access control (RBAC) are able to support the well-known security principles and roles'inheritance. But for there remains a lack of specific definition and the necessary formalizat... The main advantages of role-based access control (RBAC) are able to support the well-known security principles and roles'inheritance. But for there remains a lack of specific definition and the necessary formalization for RBAC, it is hard to realize RBAC in practical work. Our contribution here is to formalize the main relations of RBAC and take first step to propose concepts of action closure and deta closure of a role, based on which we got the specification and algorithm for the least privileges of a role. We propose that roles' inheritance should consist of inheritance of actions and inheritance of data, and then we got the inheritance of privileges among roles, which can also be supported by existing exploit tools. 展开更多
关键词 role-based access control least privileges role's inheritance
下载PDF
A Lattice Model on P2P Based on Trust and Role
14
作者 Yihe Liu 《通讯和计算机(中英文版)》 2010年第1期46-50,共5页
关键词 P2P网络 格子模型 信任度 基于角色的访问控制 信息安全模型 rbac 晶格模型 信息流
下载PDF
基于RBAC的IPv6环境网络信息安全访问控制方法
15
作者 李程 《通信电源技术》 2023年第22期194-196,共3页
常规的互联网协议第6版(Internet Protocol version 6,IPv6)环境网络信息安全访问控制方法主要使用ReliefF算法获取最优特征集合,易受访问约束限制影响,导致安全访问控制延时过高。针对此问题,利用基于角色的控制访问(Role-Based Access... 常规的互联网协议第6版(Internet Protocol version 6,IPv6)环境网络信息安全访问控制方法主要使用ReliefF算法获取最优特征集合,易受访问约束限制影响,导致安全访问控制延时过高。针对此问题,利用基于角色的控制访问(Role-Based Access Control,RBAC)方法设计一种全新的IPv6环境网络信息安全访问控制方法。构建了IPv6环境网络信息安全访问控制模型,利用RBAC生成了网络信息安全访问控制关系,实现了网络信息安全访问控制。实验结果表明,所设计的基于RBAC的IPv6环境网络信息安全访问控制方法的访问控制延时相对较低,证明设计的环境网络信息安全访问的控制效果较好,具有可靠性,有一定的应用价值,为降低IPv6环境网络风险做出了一定的贡献。 展开更多
关键词 基于角色的控制访问(rbac) 互联网协议第6版(IPv6) 信息安全 访问控制
下载PDF
基于策略的动态角色分配模型及应用
16
作者 冯骐 马晨辉 《计算机与数字工程》 2024年第1期75-80,共6页
访问控制是应用系统中的重要问题之一。传统的基于角色的访问控制(RBAC)方案需要预先定义和同步用户-角色赋值关系,这会带来管理成本和同步开销,并且限制了应用系统的灵活性和动态性。文章提出一种基于策略的动态角色分配模型(Policy-ba... 访问控制是应用系统中的重要问题之一。传统的基于角色的访问控制(RBAC)方案需要预先定义和同步用户-角色赋值关系,这会带来管理成本和同步开销,并且限制了应用系统的灵活性和动态性。文章提出一种基于策略的动态角色分配模型(Policy-based Dynamic Role Assignment Model——PDRA),它无需同步用户就可以自定义角色,并通过策略匹配的方式实现动态分配。模型完全兼容RBAC,可以成为RBAC良好的扩展机制。文章给出了模型的定义和算法,评估了模型的性能,并在华东师范大学的数据治理平台中进行了应用,验证了该方案的可行性和有效性。 展开更多
关键词 访问控制 基于角色的访问控制 基于策略的动态角色分配模型 策略匹配算法 数据治理平台
下载PDF
RBAC模型研究、改进与实现 被引量:23
17
作者 李志英 黄强 +1 位作者 楼新远 冉鸣 《计算机应用》 CSCD 北大核心 2006年第12期2945-2947,共3页
针对传统RBAC模型的角色管理过于复杂,权限粒度不够细化等不足,提出了一种改进模型,并详细描述了该改进模型的特点,引入了限制元素和特有权限等新概念。通过将功能模块及其相关操作映射为权限数据,使得权限代码和业务逻辑代码完全解耦... 针对传统RBAC模型的角色管理过于复杂,权限粒度不够细化等不足,提出了一种改进模型,并详细描述了该改进模型的特点,引入了限制元素和特有权限等新概念。通过将功能模块及其相关操作映射为权限数据,使得权限代码和业务逻辑代码完全解耦。最后结合实例,详细阐述了该改进模型应用于权限管理系统的实现过程,以及该模型的优缺点。 展开更多
关键词 基于角色的访问控制 限制元素 MVC
下载PDF
基于RBAC改进模型的角色权限及层次关系分析 被引量:18
18
作者 吕宜洪 宋瀚涛 龚元明 《北京理工大学学报》 EI CAS CSCD 北大核心 2002年第5期611-614,共4页
针对著名的 RBAC96模型的不足之处 ,结合私有权限、部门权限和权限属性变化等问题 ,对角色权限及角色层次关系进行了分析 ,提出了一个改进的角色层次化关系模型 .该模型引入特征权限等概念 ,通过定义一般继承、私有化继承、公有化继承... 针对著名的 RBAC96模型的不足之处 ,结合私有权限、部门权限和权限属性变化等问题 ,对角色权限及角色层次关系进行了分析 ,提出了一个改进的角色层次化关系模型 .该模型引入特征权限等概念 ,通过定义一般继承、私有化继承、公有化继承和无特征继承等新的角色继承方式建立角色层次化关系模型 .新模型比 RBAC96模型更加简化和易于理解 ,且具有更强的可伸缩性 ,特别适合于在复杂的角色层次关系中应用 ,例如网络操作系统、大型数据库、分布式应用等 . 展开更多
关键词 rbac改进模型 角色权限 访问控制 权限继承 角色层次关系 特征权限
下载PDF
一种基于改进RBAC模型的EIS权限管理框架的研究与实现 被引量:13
19
作者 陈琛 陈学广 +2 位作者 王煜 张震文 洪流 《计算机应用研究》 CSCD 北大核心 2010年第10期3855-3858,共4页
对基于角色的访问控制(RBAC)模型进行了延伸和拓展,提出了一种细粒度权限控制的改进模型FG-RBAC,并在此模型基础上设计开发了一套能为企业信息系统(EIS)开发者和用户提供更简单、更实用、更快速的数据级权限管理解决方案的管理框架。该... 对基于角色的访问控制(RBAC)模型进行了延伸和拓展,提出了一种细粒度权限控制的改进模型FG-RBAC,并在此模型基础上设计开发了一套能为企业信息系统(EIS)开发者和用户提供更简单、更实用、更快速的数据级权限管理解决方案的管理框架。该框架已在若干个国有大型企业集团EIS的权限管理中获得成功应用。 展开更多
关键词 基于角色的访问控制 企业信息系统 细粒度权限控制 数据级授权 权限框架
下载PDF
改进的RBAC模型在信息服务平台上的应用 被引量:7
20
作者 董永峰 陆军 +2 位作者 刘建波 周艳聪 顾军华 《计算机应用与软件》 CSCD 北大核心 2012年第5期99-103,共5页
针对RBAC模型的不足,在研究传统的RBAC基本原理基础上,结合信息服务平台权限众多、用户和角色数目庞大的特点,提出一种改进的RBAC模型。该模型引入了组织结构、用户组的概念,扩展了资源的类型和资源权限授权形式,给出了模型的形式化定义... 针对RBAC模型的不足,在研究传统的RBAC基本原理基础上,结合信息服务平台权限众多、用户和角色数目庞大的特点,提出一种改进的RBAC模型。该模型引入了组织结构、用户组的概念,扩展了资源的类型和资源权限授权形式,给出了模型的形式化定义,并将其运用在信息服务平台上。平台已成功与某高校科研管理系统进行了整合,实践表明,改进的RBAC模型不仅简化了权限管理、减少了角色数量,并且提高了系统的安全性和权限管理的灵活性。 展开更多
关键词 rbac 访问控制 角色 组织 许可 信息服务平台
下载PDF
上一页 1 2 38 下一页 到第
使用帮助 返回顶部