期刊文献+

基于角色的代理统一模型 被引量:5

Integrated Role-Based Delegation Model
下载PDF
导出
摘要 基于角色的代理是当前访问控制领域研究的核心问题之一。文章提出一种基于角色的用户-用户代理和角色-角色代理统一模型IRBDM,讨论了IRBDM模型的基本思想、体系结构、多步代理及代理撤消策略,它可在网络、工作流管理系统中广泛应用。 Role-based delegation is now one of kernel problems in the area of access control.A role-based integrated delegation model(IRBDM)of user-to-user and role-to-role is presented in the paper,and it's main idea,architecture,multiple step delegation and delegation revocation policies are discussed respectively.It will be extensively used in network and workflow management systems.
出处 《计算机工程与应用》 CSCD 北大核心 2004年第23期54-58,共5页 Computer Engineering and Applications
基金 国家自然科学基金(编号:962204012) 陕西师范大学重点科研基金(编号:2002995105)
  • 相关文献

参考文献10

  • 1Sandhu,Edward Coyne,Hal Feinstein et al.Role-Based Access Control Models[J].IEEE Computer,1996;29(2):38~47
  • 2R Sandhu,D Ferraiolo,R Kuhn.The NIST model for role-based access control:Towards a unified standard[C].In:Proc of 5th ACM Workshop on Role-Based Access Control,USA:ACM,2000:60~110
  • 3Ezedin Barka,Ravi Sandhu.Framework for Role-Based Delegation Models[C].In:Proc of 16th Annual Computer Security Application Conference(ACSAC 2000),2000:101 ~ 114
  • 4Ezedin Barka,Ravi Sandhu.A Role-Based Delegation Model and Some Extensions[C].In:Proc of 23rd National Information Systems Security Conference (NISSC 2000),2000
  • 5Longhua Zhang,Gail Joon Ahn,Bei Tseng Chu.A rule-based Framework for Role-Based Delegation[C].In:Proc 6th ACM Symposium on Access Control Models and Technologies(SACMAT 2001 ),2002
  • 6Xinwen Zhang,Sejong Oh,Ravi Sandhu.PBDM:A Flexible Delegation Model in RBAC[C].In:SACMAT'03,2003:2-3
  • 7Ravi Sandhu.Future Directions in Role-Based Access Control Models[C].In:Vladimir Gorodetski eds.Proc of the Mathematical Methods,Models,and Architectures for Network Security Systems,Lecture Notes in Computer Science 2052 Berlin,Springer,2001:22~26
  • 8赵庆松,孙玉芳,孙波.RPRDM:基于重复和部分角色的转授权模型[J].计算机研究与发展,2003,40(2):221-227. 被引量:32
  • 9王小明,赵宗涛,吴江.一种关系数据库系统角色授权非级连撤消算法[J].小型微型计算机系统,2003,24(9):1650-1654. 被引量:1
  • 10王小明,赵宗涛,冯德民.一种动态角色委托代理授权模型[J].计算机科学,2002,29(2):66-68. 被引量:14

二级参考文献34

  • 1Ravi Sendhu, Venkata Bhamidipati, and Qamhr Munawer. The ARBAC97 model for role-based administration of roles[J]. ACM Transactions on Information and system Security,Feb.1999,2(1) : 105- 135.
  • 2Steve Barker et al. Flexible security policies in SQL[C].In:Proceedings of 15^th IFIP Conference on Database Security,2001.
  • 3Bruce SCHNEIER. Applied cryptography-protocols,algorithims and source code in C[M]. John Wiley & Sons,Inc. Second Edition, 1996.
  • 4Sandhu R and Samarati P. Access control prineiplesand practice[J]. Sept. 1999,IEEE Comm. ,40-48.
  • 5Gagliardi R, lapis G and Lindsay B G. A flexible and efficient database authorization facility CRY. IBM Research Report RJ6826,1989.
  • 6Liugi Guiri. Role-based access control :a natural approach[C]. In Proceedings of the 1st ACM Workshop on Role-Based Access Control. ACM, 1997.
  • 7Hoffman J. Implementing RBAC on type enforced systems[C].In: Proceedings, 13st Annual Computer Security Applications Conference. IEEE Computer Society Press, 1997.
  • 8Department of Defence (USA), Department of defense trusted computer system evaluation criteria[R], DoD 5200-78-STD,DoD, 1985.
  • 9Sandhu R, Ferraiolo D, Kuhn R. The NIST model for role-based access control : towards a unified standdard[C]. In : Proceeding of 5th ACM Workshop on Role-Based Access Control. ACM,Berlin, Germany, July, 2000.
  • 10Sylvia Osborn, Ravi Sandhu, and Qamar Munawer. Configuring role-based access control to enforce mandatory and discretionary access control policies[J]. ACM Transactions on Information and System Security,May 2000,3(2) :45-73.

共引文献39

同被引文献21

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部