期刊文献+

一种Web环境下改进的权限控制机制 被引量:4

An improved mechanism of authorization control based on Web environment
在线阅读 下载PDF
导出
摘要 文章对当前权限系统设计过程中的主要权限分配方法:自主型的访问控制(DAC),强制型的访问控制(MAC)和基于角色的访问控制(RBAC)进行了分析和比较,指出它们各自的特点和适用局限性。针对现代企业管理的新特点,作者就管理信息系统中多用户权限控制技术进行了探讨,结合现有权限控制模型,提出并实现了应用程序中基于角色级、部门级和用户级的三级安全控制新模式。实践表明该方法提高了信息系统的安全性和可维护性。 The paper analyzes and compares several primary ways to distribute privileges during the current design process of access system such as Discretionary Access Control (DAC), Mandatory Access Control (MAC) and Role-Based Access Control (RBAC), points out their respective characteristics and limitations of their applicability. By taking the new characteristics of modem enterprise management into consideration and combining with the existing access control model, the authors discuss the access control technology of the multi-users information system, present and realize the security control model based on role level, department level and user level in the application. Practical application makes clear that it enhances the security and maintainability of information system.
作者 李波 黄东军
出处 《企业技术开发》 2006年第4期3-5,11,共4页 Technological Development of Enterprise
关键词 EB 基于角色的访问控制 安全 权限控制 授权机制 Web role based access control(RBAC) security access control authorization mechanism
  • 相关文献

参考文献4

二级参考文献23

  • 1[1]Ravi S Sandhu, et al. Role-Based Access Control Models[J].Computer IEEE, 1996,29 (2): 38-47.
  • 2[2]Matthew J Moyer, Mustaque Ahamad. Generalized Role-Based Access Control [J]. Proceedings-International Conference on Distributed Computing Systems, 2001, (4): 391-398.
  • 3[3]Sandhu R S,et al. Role-Based Access Control: A Multi-dimensional View[J]. Annual Computer Security Applications Conference, 1994, (12) :54-62.
  • 4Sandhu R., Coyne E.J., Feinstein H.L.,Youman C.E.. Role-based access control model. IEEE Computer, 1996, 29(2): 38~47
  • 5Bell D., LaPadual L.J..Secure computer system: Unified exposition and MULTICS interpretation. MITRE Corporation, Bedford, Mass: Technical Report MTR-2997, 1976
  • 6Lin T.. Bell and LaPadula Axioms: A "new" paradigm for an "old" model. In: Proceedings of the 1992~1993 ACM SIGSAC New Security Paradigms Workshop, Little Compton, 1993, 82~93
  • 7Bell D.. Secure computer systems: A network interpretation. In: Proceedings of the 2nd Aerospace Computer Security Conference, McLean, 1986, 32~39
  • 8Smalley S., Fraser T.. A security policy configuration for the security-enhanced Linux. NAI Labs, Technical Report, 2001
  • 9Mayer F.. An interpretation of a refined Bell-La padula model for the TMach kernel. In: Proceedings of the 4th Aerospace Computer Security Conference, Orlando, FL, 1988, 368~378
  • 10Sandhu R.. Role activation hierarchies. In:Proceedings of the 3rd ACM Workshop on Role-based Access Control, FariFax, 1998, 33~40

共引文献151

同被引文献26

引证文献4

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部