期刊文献+

基于角色与基于规则相结合的访问控制模型 被引量:5

A Role and Rule-based Access Control Model
在线阅读 下载PDF
导出
摘要 针对基于角色的访问控制模型的局限性 ,提出了一种基于角色与基于规则相结合的访问控制模型 ( RRBAC) .该模型以可扩展的用户组织结构为框架 ,根据用户组织结构定义角色的属性及其继承关系 ,用参数化的规则集合描述了用户组织结构中由上下级关系所引发的操作许可 ,实现了面向群组协同工作的分级权限管理体系 .最后 。 For the limitation of role based access control model, a role and rule based access control model is proposed. The frame of the model is an extendible organizational structure of users, the attribute and inherited relation of role is defined according to the organizational structure of users, the permissions introduced by the level relation of the organizational structure of users is depicted by the parameterized rule set, and the group cooperative work oriented hierarchical authorization management system is implemented. Then the design instance is given by combining database design.
出处 《武汉理工大学学报(交通科学与工程版)》 北大核心 2003年第5期678-681,共4页 Journal of Wuhan University of Technology(Transportation Science & Engineering)
基金 武汉市重点科技攻关项目资助 (批准号 :200110 0 10 0 3 )
关键词 角色 规则 访问模型 分级权限管理 访问控制 role rule database access control authorization management
  • 相关文献

参考文献5

二级参考文献8

  • 1[1]Sandhu RS, Coyne EJ, Feinstein HL et al. Role based Access Control Model. IEEE Computer, 1996, 29(2): 38-47
  • 2[2]Jajodia S, Samarati P, Subrahmanian VS. A Logical Language for Expressing Authorization. IEEE Symposium on Security and Pricacy, 1997
  • 3[3]Bertino E, Samarati P, Jaiodia S.An Extended Authorization Model for Relation Databases. IEEE Transaction on Knowledge and Data Engineering, 1997,9(1)
  • 4Fang Chen,ACMRBAC Workshop,1996年
  • 5.
  • 6D. D Clark,and D. R Wilson.A Comparison of commercial and military computer security policies[].IEEE Symposium on Computer Security and Privacy.1987
  • 7.Integrity in Automated Information Systems[]..1991
  • 8董丽,李京华,王克宏.基于CORBA的Web计算体系结构的研究[J].清华大学学报(自然科学版),2000,40(9):82-85. 被引量:10

共引文献159

同被引文献16

  • 1张明,曾家智.主动网络的安全模型研究[J].微计算机信息,2004,20(10):122-123. 被引量:6
  • 2张丽娟,李舟军.分类方法的新发展:研究综述[J].计算机科学,2006,33(10):11-15. 被引量:20
  • 3Noel Rappin, Robin Dunn. Manning Publications wxPython in Action [M] . Greenwich, United States: Manning Publications Co. Mar, 2006.
  • 4WesleyJ.Chun著,CPUG译.Python核心编程.第2版,北京:人民邮电出版社.
  • 5Ryutov, T, Neuman, C, Dongho, Kim, et al. Integrated access control and intrusion detection for Web servers[J].2003,14(9):841~850.
  • 6Wolf, R, Keinz, T, Schneider, M.A model for content-dependent access control for Web based services with role-based approach[J]. Database and Expert Systems Applications, 2003(10):209~214.
  • 7Abadi, M.Logic in access control[J]. Logic in Com puter Science, 2003(6):228~233.
  • 8耿祥义.JSP使用教程[M],北京:清华大学出版社,2003.
  • 9王进亮,史洪飞译.精通EJB[M].Ed Roman,Mastering Enterpri se JavaBeans,北京:电子工业出版社,2002.
  • 10Active Network Working Group.Architecture framework for active networks version 1[Z].USA:Active Network Working Group,1999.

引证文献5

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部