期刊文献+

TRBAC中翻转点选择和安全恢复算法的研究 被引量:2

Research on Turn Time Point and Security Recover in Timed Role-based Access Control
在线阅读 下载PDF
导出
摘要 在分析具有时间约束特性的角色访问控制模型(TRBAC)的基础上,对其中翻转点选择和安全状态恢复问题进行了阐述,提出了在TRBAC中判断系统安全状态的翻转点选择算法,选择合理的终止会话集合使系统恢复到安全状态的算法。该算法在一定程度上解决了翻转时间点选择过大或过小引起的效率和安全冲突的问题。 Based on the analysis of time-constraint role-based access control model, the problems of choosing the turn time point and security status recovery are explained, and the algorithms of choosing the turn time point which can judge the system security status in TRBAC and choosing the reasonable teminating session set which will restore the system are proposed. Therefore, the algorithm solves the conflict, to some extent, between efficiency and security caused by when the turn time point choosing is too big or too small.
作者 高利军 徐蕾
出处 《计算机工程》 CAS CSCD 北大核心 2007年第9期154-156,共3页 Computer Engineering
基金 辽宁省航空基金资助项目(20044012)
关键词 角色 翻转点 时间约束 安全状态恢复 Role Turn time point Time-constraint Security status recovery
  • 相关文献

参考文献4

二级参考文献17

  • 1[1]Sandhu, R. Issues in RBAC . In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 21~24.
  • 2[2]Jaeger, T. On the increasing importance of constraints. In: Proceedings of 4th ACM Workshop on Role-Based Access Control. Fairefax, VA: ACM Press, 1999. 33~42.
  • 3[3]Ahn, G.-J. The RCL2000 language for specifying role-based authorization constraints [Ph.D. Thesis]. Fairfax, VA: George Mason University, 1999.
  • 4[4]Sandhu, R., Coyne, E.J., Feinstein, H.L., et al. Role-Based access control models. IEEE Computer, 1995,29(2):38~47.
  • 5[5]Chen, Fang, Sandhu, R. Constraints for role-based access control. In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 39~46.
  • 6Ferraiolo DF, Sandhu R, Gavrila S. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 2001,4(3):224-274.
  • 7Osbom S, Sandhu R. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, 2000,3(2):85-106.
  • 8AHN G-J, Sandhu R. Role-Based authorization constraints specification. ACM Transactions on Information and System Security, 2000,3(4):207-226.
  • 9Sandhu R. Issues in RBAC. In: Youman C, Sandhu R, Coyne E, eds. Proceedings of the 1st ACM Workshop on Role-based access control. ACM Press, 1996. 21-24.
  • 10Ferraiolo D, Kuhn R. Role based access control. In: Proceedings of the 15th National Computer Security Conference, National Institute of Standards and National Computer Security Center. 1992. 641-650.

共引文献120

同被引文献7

  • 1Blaze M,Feigenbaum J,Ioannidis J. The eyNote Trust Management System Version 2. Internet Society,Network Working Group. RFC 2704,999.
  • 2Ray I, Chakraborty S. TrustBAC-Integrating Trust Relationships into the RBAC Model for Access Control in Open Systems, SACMAT'06, Lake Tahoe, California, USA 2006:7 - 9.
  • 3Ray I, Chakraborty S, Vector A. Model of Trust for Developing Trustworthy Systems. In Proceedings of the 9th European Symposium of Research in Computer Security (ESORICS 2004), volume 3193 of Lecture Notes in Computer Science , Sophia Antipolis, France, September 2004:260 - 275.
  • 4Grandison, T. , Sloman, M. : A survey of trust in internet applications. IEEE Communications Surveys and Tutorials 3 (20001 2 -1.
  • 5Barka E, Sandhu R. A Role-based Delegation Model and Some Extensions[C]//Proc. of the 23rd National Information Systems Security Conference. Baltimore, MD, USA: [s. n.], 2000:101-114.
  • 6Zhang Xinwen, Sejong O, Sandhu R. PBDM: A Flexible Delegation Model in RBAC[C]//Proc. of SACMAT'03. Como, Italy: [s. n.], 2003: 149-157.
  • 7Jacques W, Akhil K, Paulo B. DW-RBAC: A Formal Security Model of Delegation and Revocation in Workflow Systems[J]. Information Systems, 2007, 32(3): 365-384.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部