期刊文献+

一种基于角色的访问控制扩展模型及其实现 被引量:42

Design of an Extended Role-Based Access Control Model and Its Impementation
下载PDF
导出
摘要 提出了一种新的基于角色的访问控制模型 ,该模型对典型RBAC模型进行了扩展 ,在典型RBAC模型只对与访问主体安全相关的概念进行抽象的基础上 ,增加了对与访问对象和访问事务安全相关的概念的抽象 ,增强了RBAC模型的功能 该模型具有简单、灵活、表达力强、可用性强和与现实世界更接近等特点 在给出模型的形式化定义之后 ,还对该模型的实现方法进行了分析和研究 ,设计了模型实现的框架结构和角色分配的监控器机制 。 A new role based access control model is proposed, which extends the traditional role based access control (RBAC) model Based on the abstraction of the user properties relevant to security in traditional RBAC model, the new model adds the abstraction of the object properties and access properties relevant to security Using the traditional concept of role, it incorporates these properties into the access decision and enhances RBAC's power and function The characteristics of the new model include simpleness, flexibility, power expression ability, and strong usability Also it is closer to the real world than the traditional RBAC model After giving a formal definition of the new model, its implementation method is studied and the structure of model implementation, the monitor mechanism of role assignment, and the access decision policy are presented
出处 《计算机研究与发展》 EI CSCD 北大核心 2003年第10期1521-1528,共8页 Journal of Computer Research and Development
基金 国家自然科学基金(698840 0 3 ) 浙江省自然科学基金(60 0 0 14 )
关键词 访问控制 安全模型 角色 access control security model role
  • 相关文献

参考文献8

  • 1乔颖,须德,戴国忠.一种基于角色访问控制(RBAC)的新模型及其实现机制[J].计算机研究与发展,2000,37(1):37-44. 被引量:75
  • 2訾小超,张绍莲,茅兵,谢立.访问控制技术的研究和进展[J].计算机科学,2001,28(7):26-28. 被引量:15
  • 3R S Sandhu, E J Coync, H L Fcinstcin et al. Role-based access control model. IEEE Computer, 1996, 29(2): 38-47.
  • 4R Sandhu, D Ferraiolo, R Kuhn. The NIST model for role-based access control: Towards a unified standard. In: Proe of the 5th ACM Workshop on Role Based Access Control. Berlin, Germany: ACM Press, 2000. 47-63.
  • 5K Izaki, K Tanaka, M Takizawa. Access control model in obiectoriented systems. In: Proc of the 7th Int'l Conf on Parallel and Distributed Systems: Workshops. Iwate, Japan: IEEE Computer Society, 2000. 69-74.
  • 6M J Moyer, M Ahamad. Generalized role-based access control. In: Proc of the 21st Int'l Conf on Distributed Computing Systems. Phoenix: IEEE Computer Society, 2001. 391-398.
  • 7D Ferraiolo, R Sandhu, S Gavrila et al. A proposed standard for role-based access control. NIST. 2000. http://csrc. hist. gov/rbae/.
  • 8D K Gifford, P Jouvelot, M A Sheldon et al. The research file systems. In: Proc of the 12th ACM SIGOPS Symposium on Operating Systems Principles. Pacific Grove, CA: ACM Press,1991. 16-25.

二级参考文献5

  • 1Chang C C,Inform Sci,1997年,96卷,1-2期,15页
  • 2Hw ang M S,Computers Security,1996年,15卷,1期,73页
  • 3Hw ang M S,IEICE Trans Inf Syst,1994年,77卷,9期,1042页
  • 4Hwang J J,Computer J,1992年,35卷,1期,16页
  • 5陈爱民,计算机的安全与保密,1992年,141页

共引文献86

同被引文献258

引证文献42

二级引证文献174

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部