期刊文献+

支持属性证书的RBAC模型及其在CSCW中的应用研究 被引量:4

Research on role based access control model supporting attribute certificate and its application in CSCW
下载PDF
导出
摘要 针对CSCW(computer supported cooperative work)中的访问控制需求,利用基于角色和基于任务的访问控制技术,将协同设计中的用户、任务、角色、权限相关联,并引入属性证书进行授权,建立了一种新的访问控制模型NT-RBAC(new task-role based access control),并实现了基于该模型的访问控制子系统。实例表明NT-RBAC提高了CSCW中访问控制的灵活性和安全性。 According to the requirement of access control in CSCW(computer supported cooperative work), a new access control model NT-RBAC was constructed with the technology of access control based on role and task. The model associated users with task, role and permission in collaborative design. Meanwhile the attribute certificate was introduced to authorize permissions. Finally, an access control system based on this model was implemented, and instances show that the proposed system can improve the agility and security of the access control effectively.
作者 陆佃杰 刘弘
出处 《通信学报》 EI CSCD 北大核心 2006年第11期161-165,共5页 Journal on Communications
基金 国家自然科学基金(69975010 60374054) 山东省自然科学基金(Y2003G01 Z2004G02)~~
关键词 CSCW 角色 任务 属性证书 CSCW role task attribute certificate
  • 相关文献

参考文献9

二级参考文献31

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2Thomas R K, Sandhu R S. Toward a task- based paradigm for flexible and adaptable access control in distributed applications[A]. In: Proc of 1992-1993 ACM SIGSAC New Security Paradigms Workshops[C]. NY: [s. n.], 1993. 138-142.
  • 3Sandhu R S, Conyne E J, Lfeinstein H, et al. Role-Based Access control Model[J]. IEEE Computer, 1996, 29(2):38-47.
  • 4Kandala S, Sandhu R. Secure Role- Based Workflow Models[A]. In: Proceedings of the 15th IFIP WG 11.3 Working Conference on Database Security [C]. Niagara, Ontario,Canada:[s.n.], 2002.45-58.
  • 5Oh S, Sandhu R. A Model for Role Administration Using Organization Structure [A]. In: Seventh ACM Symposium on Access Control Models and Technologies(SACMAT'02)[C].Monterey, California, USA: [s. n.],2002. 155-162.
  • 6[1]R. K Thomas and R. S Sandhu. Towards a task-based paradigrm for flexible and adaptable access control in distributed applications[A]. Proc. of the Second New Security Paradigms Workshop[C]. Little Compton, Rhode Island, IEEE Press, 1993.
  • 7[2]R.K. Thomasand R. S Sandhu. Conceptual Foundations for a Mocdel ofTask-based Authorizations[A]. Proc. of the 7thIEEE Computer Security Foundations Workshop[C].Franconia,NH, 1994,6: 66~79.
  • 8[3]Ravi S.Sandu,Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Role-based access control models[J]. IEEE Computer,1996.29(2): 38~47.
  • 9[4]Ravi S. Sandu. Separatin of dutiesin computerized information systems[A]. S. Jajodia and C. E.Landwehr. Data base Security IV:Status and ProsPeets[M]. North-Holland, 1991: 179~ 189.
  • 10[5]R. K. Thomas and R. SSandhu. Task-based Authorization Controls (TBAC) :A Family of Models for Active and Enterprise-oriented Authorization Management[A]. 1997 IFIP[C]. Lake Tahoe California,Published by Chapman & Hall,1997,8:11 ~ 13.

共引文献296

同被引文献50

  • 1樊银亭,王春清,周德祥.一种ERBAC模型的设计与实现[J].合肥工业大学学报(自然科学版),2007,30(7):869-872. 被引量:9
  • 2Arivazhagan S,Ganesan L,Bama S.Fault segmentation in fabric images using Gabor wavelet transform[J].Machine Vision and Applications,2006,16(6):356-363.
  • 3Lin Jeng Jong.Applying a co-occurrence matrix to automatic inspection of weave density for woven fabrics[J].Textile Research Journal,2002,72(6):486-490.
  • 4Ren W,Beard R W.Consensus seeking in multiagent systems under dynamically changing interaction topologies[J].IEEE Transactions on Automatic Control,2005,50(5):655-661.
  • 5Lin Z,Broucke M,Francis B.Local control strategies for groups of mobile autonomous agents[J].IEEE Transactions on Automatic Control,2004,49(4):622-629.
  • 6Xiao L,Boyd S.Fast linear iterations for distributed averaging[J].Systems and Control Letters,2004,53(1):65-78.
  • 7OlfatiSaber R,Murray R M.Consensus problems in networks of agents with switching topology and time-delays[J].IEEE Transactions on Automatic Control,2004,49(9):1 520-1 533.
  • 8Jadbabaie A,Lin J,Morse A S.Coordination of groups of mobile autonomous agents using nearest neighbor rules[J].IEEE Transactions on Automatic Control,2003,48(6):988-1 001.
  • 9Zhong Weicai,Liu Jing,Xue Mingzhi,et al.A Multiagent Genetic Algorithm for Global Numerical Optimization[J].IEEE Transactions on Systems,Man and Cybernetics,2004,34(2):1 128-1 141.
  • 10Josang A,Ismail R,Boyd C.A survey of trust and reputation systems for online service provision[J].Decision Support Systems,2007,43(2):618-644.

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部