期刊文献+

RBAC职责分割定义及实现模型分析 被引量:2

Analysis on Definition and Realization Models of SoD in RBAC
在线阅读 下载PDF
导出
摘要 访问控制是信息安全领域的重要问题之一;目前,基于角色的访问控制模型(RBAC)已被广泛接受,并成为领域专家学者研究的热点;职责分割(SoD)是RBAC的重要方面,它为增强高层次的组织安全策略提供了强大的机制,RBAC职责分割定义给出了各种职责分割约束的具体内容;针对不同的职责分割需求,各种基于角色的访问控制职责分割约束实现模型不断出现;根据应用系统的实际需求选择合适的访问控制模型必须了解各种模型的特点,该文通过分析RBAC中不同SoD模型的特点,指出其适用范围。 Access control is an important content in the field of information security.At present ,the model of Role-Based Access Control(RBAC)has been widely accepted and has becoming the hotspot of related experts and scholars.Separation of Duty(SoD)is an important aspect of RBAC and is a powerful mechanism to enforce high-level security policy of an organization.The specific contents of constraints in each kind of SoDs are given by the definitions of SoDs in RBAC.Variant realization models of SoDs in RBAC have been emerged to satisfy different requirements on SoDs.To select a suitable access control model according to the real requirements in an application system,the advantages of each model must be carefully analysised.In this paper,the advantages of variant SoD models in RBAC are analysised and the suitable application fields of those models are pointed out.
作者 欧阳昱
出处 《计算机工程与应用》 CSCD 北大核心 2005年第2期112-115,190,共5页 Computer Engineering and Applications
基金 国家"十五"科技攻关计划(编号:2001BA105A1006)
关键词 安全 访问控制 RBAC 约束 职责分割 security,access control,RBAC,constraint ,SoD
  • 相关文献

参考文献11

  • 1何海云,张春,赵战生.基于角色的访问控制模型分析[J].计算机工程,1999,25(8):39-41. 被引量:34
  • 2邓集波,洪帆.基于任务的访问控制模型[J].软件学报,2003,14(1):76-82. 被引量:222
  • 3Ravi Sandhu.Role-Based Access Control[J].http://www.Isse.gmu/faculty/sandhu.
  • 4Ravi Sandhu,David Ferraiolo,Richard Kuhn.The NIST model for role-based access control :towards a unified standard[C].In :Proceedings of the fifth ACM workshop on Role-based access control,2000: 47-63.
  • 5R Simon,M Zurko.Separation of duty in role-based environments[C]. In:Proceedings of the 10th IEEE Computer Security Foundations Workshop, Rockport, Mass, 183-194.
  • 6Gail-Joon Ahn,Ravi Sandhu.Role-based authorization constraints specification[J].ACM Transactions on Information and System Security (TISSEC) ,2000;3(4).
  • 7David F Ferraiolo,D Richard Kuhn,J A Cugini.Role Based Access Control : Features and Motivations[C].In : Proceedings of Computer Security Applications Conference, 1995-12.
  • 8R A Botha,J H D Eloff.Separation of duties for access control enforcement in workflow environments[J].IBM system Journal,2001; 40(3).
  • 9E Bertino,P A Bonatti,E Ferrari.TRBAC:A temporal role-based access control model[J].ACM Transactions on Information & System Security,2001 ;4(3) : 191-233.
  • 10James B D Joshi,Elisa Bertino,Basit Shafiq et al.Dependencies and Separation of Duty Constraints in GTRBAC.

二级参考文献1

共引文献253

同被引文献8

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部