期刊文献+

GIS中空间相关的动态角色控制 被引量:1

Spatial-Based Dynamic Role Control in GIS
在线阅读 下载PDF
导出
摘要 GIS应用系统中,不同用户角色拥有不同用户权限区,这种角色控制方式适合现行的管理机制,但以区域来确定用户权限区的固定角色控制对解决跨区域协作问题存在困难,当业务发展涉及多个区域时,不能合理有效地共享信息,造成信息系统失效。针对该问题,基于角色的访问控制提出空间相关的动态角色控制,分析其需要考虑的方面并进行详细的设计,探讨总体结构和核心设计,通过一个森林防火GIS中火灾跨区域扑救协作典型试验,证明空间相关的动态角色控制对解决跨区域协作的可行性。 In GIS application system, different users have diverse jurisdiction districts, which is available for existing management mechanism. But in this way, there is difficult to dispose the cooperation question of crossing regions because the user roles are determined by the regions. When the crossing regions are needed in work, it will be not to share information and cause information system invalid. This paper proposes the spatial - based dynamic role control,which is based on the theory of role- based access control. It analyzes the characteristics of spatial - based dynamic role control, makes a thorough and careful design, and discusses the overall organization and core design. Finally an example of a Wildfire Alarm and Prevention GIS is provided to prove the feasibility of spatial - based dynamic role control to crossing region cooperation.
出处 《地理与地理信息科学》 CSCD 北大核心 2006年第4期40-43,共4页 Geography and Geo-Information Science
关键词 空间相关 动态角色控制 RBAC GIS 跨区域 spatial - based dynamic role control RBAC GIS crossing regions
  • 相关文献

参考文献9

二级参考文献26

  • 1刘怀宇.基于角色的细粒度的访问控制系统的研究与实现[M].北京:北京航空航天大学计算机科学与工程系,1999..
  • 2[1]Sandhu, R. Issues in RBAC . In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 21~24.
  • 3[2]Jaeger, T. On the increasing importance of constraints. In: Proceedings of 4th ACM Workshop on Role-Based Access Control. Fairefax, VA: ACM Press, 1999. 33~42.
  • 4[3]Ahn, G.-J. The RCL2000 language for specifying role-based authorization constraints [Ph.D. Thesis]. Fairfax, VA: George Mason University, 1999.
  • 5[4]Sandhu, R., Coyne, E.J., Feinstein, H.L., et al. Role-Based access control models. IEEE Computer, 1995,29(2):38~47.
  • 6[5]Chen, Fang, Sandhu, R. Constraints for role-based access control. In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 39~46.
  • 7Ferraiolo DF, Sandhu R, Gavrila S. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 2001,4(3):224-274.
  • 8Osbom S, Sandhu R. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, 2000,3(2):85-106.
  • 9AHN G-J, Sandhu R. Role-Based authorization constraints specification. ACM Transactions on Information and System Security, 2000,3(4):207-226.
  • 10Sandhu R. Issues in RBAC. In: Youman C, Sandhu R, Coyne E, eds. Proceedings of the 1st ACM Workshop on Role-based access control. ACM Press, 1996. 21-24.

共引文献140

同被引文献13

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部