期刊文献+

dRBAC模型的安全分析

Towards Security Analysis of the dRBAC Model
在线阅读 下载PDF
导出
摘要 dRBAC模型是适应于动态结盟环境的分布式信任管理和访问控制机制,具有第三方委托、值属性和证书预定等三个特征.但dRBAC模型存在一些不足,体现在以下几个方面:委托的深度没有控制;委托链的循环搜索;角色的隐式提升;职责分离原则的违背等.本文针对dRBAC模型存在的问题进行了详细的讨论,提出了合理的解决方案,提高了dRBAC模型的安全性和实用性. The dRBAC model is a scalable, decentralized trust-management and access-control mechanism for systems that span multiple administrative domains. The dRBAC model supports three feathers., third-party delegations, valued attributes, credential subscription. However, there are some limitations of the dRBAC model, which represent the following issues: no control on the depth of delegation, circular search for delegation chain, covert promotion of role, violating separation of duty. In this paper, these issues are discussed in detail, and reasonable resolutions of these issues are proposed in order to improve the security and practicability of the dRBAC model.
出处 《小型微型计算机系统》 CSCD 北大核心 2007年第7期1177-1180,共4页 Journal of Chinese Computer Systems
基金 国家自科基金项目(60403027)资助 湖南教育厅基金(03C500)资助.
关键词 dRBAC模型 委托深度 委托链 角色隐式提升 职责分离 dRBAC model depth of delegation delegation chain covert promotion of role separation of duty
  • 相关文献

参考文献9

  • 1Eric Freudenthal,Tracy Pesin,Lawrence Port,et al.dRBAC:distributed role-based access control for dynamic coalition environments[C].In:Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02),July 2002,411-434.
  • 2Ravi S Sandhu,Edward J Coyne,Hal L Feinstein,et al.Role-based access control models[J].IEEE Computer,1996,29 (2):38-47.
  • 3Li Ning-hui,William H Winsborough,John C Mitchell.Distributed credential chain discovery in trust management[J].Journal of Computer Security,2003,11 (1):35-86
  • 4Ellison C,Frantz B,et al.SPKI certificate theory[R].RFC 2693:http://www.faqs.org/rfcs/rfc27693.html,1999.
  • 5Matt Blaze,John Feigenbaum,Jack Lacy.Decentralized trust management[C].In:Proceedings of the 1996 IEEE Symposium on Security and Privacy.Washington:IEEE Computer Society Press,1996.164-173
  • 6Matt Blaze,John Feigenbaum,John Ioannidis,et al.The key note trust-management version 2[S].RFC 2704:http://www.faqs.org/rfcs/rfc2704.html,1999.
  • 7Li Ning-hui,John C.Mitchell,William H Winsborough.Design of a role-based trust-management framework[C].In:Proceeding of the 2002 IEEE Symposium on Security and Privacy,2002.114-130.
  • 8Ferraiolo D F,Sandhu R S,Gavrila S,et al.Proposed NIST standard for role-based access control[J].ACM Transaction on Information and Systems Security,2001,4(3):224-274.
  • 9Li Ning-hui,Ziad Bizri,Mahesh V.Tripunitara.On mutuallyexclusive roles and separation of duty[C].In:Proceeding of the 11th Conference on Computer and Communications Security,2004.New York:ACM Press,42-51.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部