期刊文献+

预算管理信息系统访问控制策略的研究与设计 被引量:1

Research and Design on Budget MIS Access Control Policy
下载PDF
导出
摘要 针对预算管理的特点,讨论了一种在预算管理信息系统中的角色、权限的表示法,并据此给出了一个预算管理信息系统的访问控制策略。将权限分为功能模块访问权限和数据访问权限,将角色分为系统角色和自定义角色,并将功能模块访问权限与系统角色关联,将数据访问权限与自定义角色关联,简化了访问控制机构的实现,提高了访问控制机构的工作效率。 The new representations of roles and permissions are discussed. An access control policy of budget MIS is also presented. This access control policy divides permissions into function-module permissions and data permissions, and divides roles into system roles and user-defined roles. Associating function-module permissions to system roles and data permissions to user-defined roles, the policy simplified implementation of access control framework, and enhanced the efficiency of processing.
出处 《计算机应用研究》 CSCD 北大核心 2006年第11期180-182,共3页 Application Research of Computers
关键词 预算管理 基于角色的访问控制 权限 角色 表示方法 Budget MIS RBAC ( Role-Based Access Control) Permission Role Representation
  • 相关文献

参考文献3

二级参考文献19

  • 1Sandhu R,Coyne E,Feinstein H et al. Role-based access control models[J].IEEE Computer, 1996;29(2) :38~47.
  • 2Sandhu R,Bhamidipati V,Coyne E et al.The ARBAC97 model for role-basod adminislration of roles:Preliminary Description and Outline[C].In:Proceedings of the 2nd ACM Workshop on Role-Based Access Control,New York,NY:ACM Press,1997:41~50.
  • 3Sandhu R,Munawer Q.The ARBAC99 Model for Administration of Roles[C].In:Proceedings of the 15th Annual Computer Security Applications Conference,Washington,DC:IEEE Computer Society,1999:229~238.
  • 4Sandhu R,Ferraiolo D,Kuhn R.The NIST model for role-based access control:towards a unified standard[C].In :Proceedings of the 5th ACM workshop on Role Based Access Control ,New York,NY:ACM Press, 2000:47~63.
  • 5Ferraiolo D,Sandhu R,Gavrila S et al. Proposed NIST Standard for Role-Based Access Control[J].ACM Transactions on Information and System Security,2001;4(3) :224~274.
  • 6L Snyder. Formal Models of Capability-based Protection Systems[ J].IEEE Transactions on Computers, 1981,30(3 ) :172-181.
  • 7R Sandhu, E Coyne, H Feinstein. Role-based Access Control Models[ J]. IEEE Computer, 1996,29 (6) :38-47.
  • 8D Ferraiolo, R Sandhu,et al. Proposed NIST Standard for Role-based Access Control [ J ]. ACM Transactions on Information and System Security(TISSEC) ,2001,4(3) :224-274.
  • 9R Thomas, R Sandhu. Task-Based Authorization Controls(TBAC) : A Family of Models for Active and Enterprise-Oriented Authorization Management[ C]. Lake Tahoe, CA: Proceedings of the 11th IFIP WG11.3 Conference on Database Security, 1997.
  • 10Gail-Joon Ahn, Myong Kang,et al. Injecting RBAC to Secure a Webbased Workflow System[ C]. ACM RBAC, 2000.

共引文献98

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部