期刊文献+

复杂资源的小粒度分级授权机制的研究 被引量:5

Research of Fine Granularity and Multi-level Authorization System Based on Complicated Resource
下载PDF
导出
摘要 分析了授权操作的运算规律,定义了授权算子集及其运算规则,提出了小粒度分级授权机制的三层架构;同时,基于定义的算子,对操作权限进行了分类,定义了小粒度分级授权模型的固有规则,建立了实际操作和算子组合之间的映射模型,完成了授权业务操作的同步,建立了资源可拓、分级授权的小粒度授权模型,实现了复杂资源的小粒度分级授权。最后以产品文档管理系统的小粒度授权模块为实例,证明了研究内容的有效性。 This thesis analyses the operation rules of authorization, defines the authorization operations and these rules, defines a three-lies construction model for the reality of the system; based on the defined operations and rules, classifies the operating privileges, defines the inherent rules of the system, and constructs the mapping model between the reality operations and the logic operations, makes these correlative operations synchronous, builds an open and extended authorization system. At last, the thesis validates the practicality and effectiveness of the constructed system by the privilege management of product document management system.
出处 《计算机工程》 EI CAS CSCD 北大核心 2005年第13期81-83,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2003AA4144023) 广东自然科学基金团队项目(2003051)
关键词 复杂资源 粒度 分级授权 授权算子 授权规则 Complicated resource Fine granularity Multi-level authorization Authorizing operation Authorization rules
  • 相关文献

参考文献5

二级参考文献15

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2杨义先.网络信息安全与保密[M].北京:北京邮电大学出版社,1998..
  • 3[5](美)佚名.网络最高安全技术指南[M].王锐,等译.北京:机械工业出版社,1998.
  • 4Ko C, Fink G,Levitt K.Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring.In Computer Security Application Confecrece,Orlando, Florida, 1994-12:5-9.
  • 5Sandhu R,Coyne E J,Feinstein H L et al.Role-Based Access Control Models[J].IEEE Computer, 1996;29(2) :38~47
  • 6Sandhu R.Rationale for the RBAC96 family of access control models[C].In:Proceeding of the 1st ACM Workshop on Role Based AccessControl, ACM, 1997: Http : / /www.list.gmu.edu/ conferen.htm
  • 7Resource Access Decision(RAD).Object Management Group Healthcare Domain Task Force,Revised Submission,OMG TC Document corbamed/99-04-04,1999
  • 8John Barkley,Konstantin Beznosov,Jinny Uppal.Supporting Relationships in Access Control Using Role Based Access Control[C].In:ACMRole-based Access Control Workshop,Fairfax,Virginia,USA,1999:55~56
  • 9吴应良.管理信息系统的安全问题与对策研究[J].计算机应用研究,1999,16(11):22-25. 被引量:31
  • 10蔡菁.基于角色的数据库权限管理[J].微型电脑应用,2000,16(8):24-26. 被引量:14

共引文献77

同被引文献48

引证文献5

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部