期刊文献+

关于RBAC模型中约束的研究综述 被引量:7

Survey on Constraints of RBAC
在线阅读 下载PDF
导出
摘要 约束是RBAC模型中的一组强制性规则,是RBAC的重要组成。目前对约束的研究主要集中在关系约束、前提约束、数值约束、职责分离约束、势约束和时间约束等方面。时间约束是时间变化和角色许可的依赖关系的规则表示。该文就连续时间约束和周期时间约束进行了描述。约束的标准化、规范以及应用领域中提出的新的约束,都需要进一步研究。 Constraints are a set of imposed rules on role-based access control (RBAC), and they are an important aspect of RBAC. Currently. The main research on constraints focus on relation constraint, precondition constraint, numerical constraint, separation of duties constraint, cardinality constraint, time constraint and so on. Time constraint denotes the rules of the time variety relate on the role enable. This paper describes the sequence time constraint and periodic time constraint. It's need to go deep into research on the standard of constraint, the pattern of constraint and the new constraint.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第9期1-3,共3页 Computer Engineering
基金 江苏省自然科学基金资助项目(BK2001016) 河海大学2003年科技创新基金资助项目(2003409443)
关键词 RBAC 约束 时间约束 RBAC Constraint Time constraint
  • 相关文献

参考文献10

  • 1Fverraiolo D,Kuhn R.Role-based Access Control[C].Proceedings of 15^th National Computer Security Conference,1992.
  • 2Sandhu R,Coyne E,Feinstein H,et al.Role-based Access Control Models[J].IEEE Computer,1996,29(2):38-47.
  • 3Ferraiolo D,Sandhu R,Gavrila S.A Proposed Standard for Role Based Access Control[J].ACM Transactions on Information and System Security,2001,4 (3).
  • 4American National Standard 359-2004 is the Information Technology Industry Consensus Standard for RBAC[EB/OL].http://csrc.nist.gov/rbac/,2005-10-20.
  • 5Jaeger T.On the Increasing Importance of Constraints[C].Proceedings of 4^th ACM Workshop on Role-based Access Control,1999:33-42.
  • 6王卓,冯珊.基于角色访问控制模型约束的OCL描述[J].计算机工程与应用,2003,39(21):100-102. 被引量:7
  • 7黄建,卿斯汉,温红子.带时间特性的角色访问控制[J].软件学报,2003,14(11):1944-1954. 被引量:73
  • 8Bertino E,Bettini C,Ferrari E.An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning[J].ACM Trans.Database Syst.,1998,23(3):231-285.
  • 9Gal A,Atlurl V.An Authorization Model for Temporal Data[C].Proceedings of 7^th ACM Conference on Computer and Communication Security,2000:144-153.
  • 10Bertino E,Bonatti P,Ferrar E.TRBAC:A Temporal Role-based Access Control Model[J].ACM Transactions on Information and Systems Security,2001,4(3).

二级参考文献19

  • 1[美]GradyBooth JamesRumbaugh IvarJacobson.UML用户指南[M].北京:机械工业出版社,2001..
  • 2OMG Web site.Unified Modeling Language Notation Guide[M].Version 1.3,2000.
  • 3Sandhu R,Bhamidipati V.The ARBAC97 Model for Role based Administration of Role :Preliminary Description and Outline[C].In:Proceedings of the 2th ACM Workshop on Role--Based Access Control, ACM. 1997.
  • 4Ravi Sandhu.Rational for the RBAC96 Family of Access Control Models[C].In:Proceedings of 1st ACM Workshop on Role-based Access control, ACM, 1997.
  • 5Sandhu R,Coyne E J.Role-Based Access Control Models[J].IEEE Computer, 1996;29(2) :38---47.
  • 6Gail-Joon Ahn,Ravi Sandhu.Role-based Authorization Constraints Specification[J].ACM Transactions on Information and Systems Security, 2000;3(4).
  • 7Chen F,Sandhu R.Constraints for role based access control[C].In: Proceedings of the 1st ACM Workshop on Role-Based Access Control, Gaithersburg, MD, 1995 : 39-46.
  • 8Pete Epstein,Ravi S Sandhu.Towards a UML Based Approach to Role Engineering[C].In:ACM Workshop on Role-Based Access Control, 1999 : 135-143.
  • 94.Michael E Shin,Gail-Joon Ahn.UML-based Representation of Role-based Access Control[C].In:Proceedings of 5th IEEE International Workshop on Enterprise Security,NIST,MD,2000.
  • 10Object Constraint Language Specification[S].A web version is in:http: //www.software.ibm.com/ad/ocl ,v.1.1,Rational software Corp, 1997.

共引文献77

同被引文献84

引证文献7

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部