期刊文献+

一种面向数字化校园的扩展权限控制模型的研究与实现 被引量:1

Research and implementation of an extended access control model for Digital Campus
下载PDF
导出
摘要 本文以高校数字化校园综合管理系统的访问与权限控制机制为背景,分析了访问控制与RBAC的工作原理,解决了RBAC本身的局限性,提出一种改进的扩展权限管理模型,并用建模软件加以实现,使之具有高效、灵活的特点。这种权限的改进机制更加适合高校数字化校园综合业务的用户身份复杂、权限重叠的特点,具有较高的稳定性和安全性,良好的扩展性和可移植性,为系统安全提供了有效的解决方案。 Based on the access to digital campus integrated management system and access control mechanism, the paper analyzes the working principle of access control with RBAC and solves the limitations of RBAC.At the same time,the paper puts forward an improved extended privilege management model.The modeling software is used to realize the aim,which has the characteristics of high efficiency and flexibility.User identity improvement mechanism of such access is more suitable for digital campus to solve complex and authority overlapping problems in comprehensive business.It has better portability and scalability,higher security and stability,and provides an effective solution for system security.
作者 王倩 包岩
出处 《电子测试》 2014年第4X期75-78,共4页 Electronic Test
基金 2013年中国高等职业技术教育研究会GZYLX1213336的项目为依托 题目是:职业教育网络教学资源自组织构建模式研究
关键词 访问控制 角色 权限 RBAC access control role privilege RBAC
  • 相关文献

参考文献2

  • 1沈海波,洪帆.访问控制模型研究综述[J].计算机应用研究,2005,22(6):9-11. 被引量:87
  • 2David F. Ferraiolo,Ravi Sandhu,Serban Gavrila,D. Richard Kuhn,Ramaswamy Chandramouli.Proposed NIST standard for role-based access control[J]. ACM Transactions on Information and System Security (TISSEC) . 2001 (3)

二级参考文献11

  • 1L Snyder. Formal Models of Capability-based Protection Systems[ J].IEEE Transactions on Computers, 1981,30(3 ) :172-181.
  • 2R Sandhu, E Coyne, H Feinstein. Role-based Access Control Models[ J]. IEEE Computer, 1996,29 (6) :38-47.
  • 3D Ferraiolo, R Sandhu,et al. Proposed NIST Standard for Role-based Access Control [ J ]. ACM Transactions on Information and System Security(TISSEC) ,2001,4(3) :224-274.
  • 4R Thomas, R Sandhu. Task-Based Authorization Controls(TBAC) : A Family of Models for Active and Enterprise-Oriented Authorization Management[ C]. Lake Tahoe, CA: Proceedings of the 11th IFIP WG11.3 Conference on Database Security, 1997.
  • 5Gail-Joon Ahn, Myong Kang,et al. Injecting RBAC to Secure a Webbased Workflow System[ C]. ACM RBAC, 2000.
  • 6Sejong Oh, Seog Park. Task-role-based Access Control Model[ J ]. Information System, 2003, 28 : 533-562.
  • 7J Park, R Sandhu. Towards Usage Control Models: Beyond Traditional Access Control[ C]. Proceedings of the 7th ACM Symposium on Access Control Models and Technologies,2002.
  • 8R Sandhu, J Park. Usage Control : A Vision for Next Generation Access Control, MMM-ACNS [ EB/OL]. http://www. list. gmu. edu/conference_papers, htm, 2003.
  • 9Sonera Piazza Ltd MediaLab. Digital Rights Management. White Paper[ EB/OL]. http://www. medialab. sonera. fr/workspace./ DRM-WhitePaper. pdf, 2002.
  • 10徐锋,吕建.Web安全中的信任管理研究与进展[J].软件学报,2002,13(11):2057-2064. 被引量:113

共引文献89

同被引文献13

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部