期刊文献+

ERBAC模型的改进与实现 被引量:13

Improvement and implementation ERBAC model
下载PDF
导出
摘要 阐述了RBAC96模型在实际应用中存在授权、访问规则、细粒度访问控制等方面的不足,分析了基于角色对用户和角色混合授权的ERBAC模型的不足,提出了一种改进ERBAC模型,使其授权更加灵活,安全性更高,并采用引入访问规则和模糊时间约束机制以及把系统模块和角色进行绑定的方法予以实现。访问规则和审计功能及模糊时间约束机制的引入能使安全性更高,把系统模块和角色进行绑定达到细粒度的访问控制。改进ERBAC模型的授权更加灵活,其安全性更高。 This article expounded the shortages of RBAC96 model in the aspects of the authorization, access rules, and finegrained access control in the practical application, and analysed the shortcomings of an extended role-based access control model ( ERBAC), which integrated the authorization of users and roles, presented a new expansion mode to make the authorization more flexible and the security more secure. And it introduced access rules and fuzzy time constraint mechanism and the role of system modules and method of binding system modules and the role achieve the goals. Access rules and audit function and fuzzy time constraint mechanism make higher security, it could by binding system modules and the role to achieve finegrained access. ERBAC model to make the authority more flexible and its security is more secure.
出处 《计算机应用研究》 CSCD 北大核心 2009年第10期3929-3932,3937,共5页 Application Research of Computers
基金 重庆市自然科学基金资助项目(CSTC2006BB2369)
关键词 基于角色的访问控制 模糊时间约束 细粒度访问 审计 访问规则 RBAC fuzzy time constraint fine-grained access audit access rule
  • 相关文献

参考文献9

二级参考文献26

  • 1袁平鹏,陈刚,董金祥.多政策的两层协同应用存取控制模型[J].计算机辅助设计与图形学学报,2004,16(4):420-426. 被引量:19
  • 2周文峰,尤军考,何基香.基于RBAC模型的权限管理系统设计与实现[J].微计算机信息,2006(05X):35-36. 被引量:25
  • 3[4]Ferraiolo D,Kuhn R.Role-Based Access Control[C]//the 15th National Computer security Conference,[S.l.]:[s.n.],1992.
  • 4Ferraiolo DF, Sandhu R, Gavrila S. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 2001,4(3):224-274.
  • 5Osbom S, Sandhu R. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, 2000,3(2):85-106.
  • 6AHN G-J, Sandhu R. Role-Based authorization constraints specification. ACM Transactions on Information and System Security, 2000,3(4):207-226.
  • 7Sandhu R. Issues in RBAC. In: Youman C, Sandhu R, Coyne E, eds. Proceedings of the 1st ACM Workshop on Role-based access control. ACM Press, 1996. 21-24.
  • 8Ferraiolo D, Kuhn R. Role based access control. In: Proceedings of the 15th National Computer Security Conference, National Institute of Standards and National Computer Security Center. 1992. 641-650.
  • 9董光宇 卿斯汉 刘克龙.带时间特性的角色授权约束.软件学报,2002,13(8):1521~1527[EB/OL].http://www.jos.org.cn/1000-9825/13/1521.pdf.,.
  • 10SANDHU RS,COYNE EJ,FEINSTEIN HL,et al.Role-based access control models[J]. IEEE Computer,1996,29(2):38-47.

共引文献158

同被引文献95

引证文献13

二级引证文献57

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部