期刊文献+

一个支持空间上下文的访问控制形式模型 被引量:22

原文传递
导出
摘要 利用上下文信息对授权决策进行控制已越来越受到重视.在无线和移动网络领域中控制资源的访问要求定义支持空间上下文的访问控制形式模型.然而,传统的RBAC模型并不能满足这些空间上的需求.文中对现有的RBAC模型进行扩充,提出了SC-RBAC模型,使其在定义安全策略时能结合用户的当前物理位置信息.提出了空间角色的概念,为角色赋予逻辑位置域以指定角色可以活动的空间范围.角色激活依赖于用户从移动终端获得的当前物理位置.紧接着,给SC-RBAC引入层次来表达权限、激活继承等关系.证明用层次化的空间角色在数学上可构建格模型以实施多级安全策略,使其更适合安全关键的位置感知信息系统对信息流的安全控制要求.随后,受限的SC-RBAC描述了3类限制:空间的职责隔离限制、基于位置的基数限制和基于位置的时序限制,这些限制允许表达位置感知系统中细粒度的空间语义.最后,为受限的SC-RBAC模型设置了9个不变量,证明了其基本安全定理,为模型在实际环境中的应用奠定了基础.
出处 《中国科学(E辑)》 CSCD 北大核心 2007年第2期254-271,共18页 Science in China(Series E)
  • 相关文献

参考文献30

  • 1Sandhu R, Coyne E, Feinstein H, et al. Role base access control models. IEEE Comp, 1996, 29(2); 38-47
  • 2Ferraolo D, Sandhu R, Gavrila S, et al. Proposed NIST standard for role-based access control. ACM Trans Inf Syst Sec,2001,4(3): 224-274
  • 3Covington M, Long W, Srinivasan S, et al. Securing context-aware applications using environment roles. In: Proceedings of the 6th ACM Symposium on Access Control Models and Technologies. New York: ACM Press, 2001. 10-20
  • 4Cuppens F, Midge A. Modelling contexts in the Or-BAC model. In: Proceedings of the 19th Annual Computer Security Applications Conference. Washington: IEEE Computer Society Press, 2003. 416-427
  • 5Wilikens M, Feriti S, Sanna A, et al. A context-related authorization and access control method based on RBAC: A case study from the health care domain. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies. New York: ACM Press, 2002. 117-124
  • 6Georgiadis C, Mavridis I, Pangalos G, et al. Flexible team-based access control using contexts. In: Proceedings of 6th ACM symposium on Access Control Models and Technologies. New York: ACM Press, 2001.21-27
  • 7Thomas R. Team based access control (TMAC): A primitive for applying role-based access controls in collaborative environments. In: Proceedings of 2nd ACM Workshop on Role-based Access Control. New York: ACM Press, 1997. 13-19
  • 8Wolf R, Keinz T, Schenider M, A model for context-dependent access control for web-based services with role-based approach. In: Proceedings of 14th International Workshop on Database and Expert Systems Applications. Washington: IEEE Computer Society Press, 2003. 209-214
  • 9Kumar A, Karnik N, Chafle G. Context sensitivity in role-based access control. ACM SIGPOS Op Syst Rev, 2002, 36(3): 53-66
  • 10Covington M, Moyer M, Ahamad M. Generalized role-based access control for securing future applications. In: Proceedings of 23rd National Information Systems Security Conference. Washington: IEEE Computer Society Press, 2003. 416-427

同被引文献292

引证文献22

二级引证文献416

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部