期刊文献+

一种面向协同设计系统的访问控制模型 被引量:1

An Access Control Model for Computer-Supported Collaborative Design System
在线阅读 下载PDF
导出
摘要 针对现有访问控制模型不能完全满足协同设计系统访问控制需求的实际,在对基于消息通信协同设计特性进行分析研究的基础上,以协同设计系统的访问控制实现为目标,以基于角色访问控制(RBAC)模型为基础,提出一种面向协同设计的消息驱动访问控制模型(MDACM).该模型应用消息实体作为权限表达,以消息实体与过滤规则相结合的方法,通过静态的配置方式实现动态的资源控制,解决了协同设计系统分布性和动态性带来的安全隐患问题.此外,通过流程控制基作用于消息实体使模型能够支持协同设计系统的工作流程管理,并通过应用示例说明模型的有效性. The existing access control models are imperfect to meet the requirements for a collaborative design system nowadays. Ba^d on the characteristics of collaborative design and RBAC (role-based access control) model, a new model named MDACM (message-driven access control model) is developed to solve security problem due to the distributivity and dynamic ability of collaboration through an authority that is expressed by a message entity or integrated message entity in combination with filter rule, then control ba~ is introduced into the model control by static allocation. Moreover, the workflow to affect message entity and support the workflow management of computer-supported collaborative design system. An application as example is given to demonstrate the effectiveness of the model.
作者 徐洪学
出处 《东北大学学报(自然科学版)》 EI CAS CSCD 北大核心 2007年第12期1733-1736,共4页 Journal of Northeastern University(Natural Science)
基金 国家"十五"重大科技攻关项目(2001BA201A14)
关键词 RBAC 访问控制 协同设计 消息实体 过滤规则 流程控制 RBAC access control collaborative design message entity filter rule workflow control
  • 相关文献

参考文献10

  • 1Wang Q P. An engineering information base management system in collaborative design [ C ] ff Lin Z K, ed. Proceedings of the Workshop on CSCW in Design. Beijing: International Academic Publishers, 1996:218 - 222.
  • 2Bullock A, Benford S. An access control framework for multi-user collaborative environments [ C ] // Proceedings International ACM SICGROUP Conference on Supporting Group Work. New York: ACM Press, 1999:140- 149.
  • 3Gollmann D. Computer security [ M]. New York: John Wiley and Sons, 1999.
  • 4Sandhu R S, Coyne E J, Feinstein H L. Role-based access control models[J]. IEEE Computer, 1996,29(2) :38- 47.
  • 5Shen H H, Dewan P. Access control for collaborative environments[C]// Proceedings of the ACM CSCW' 92 Conference on Computer Supported Cooperative Work. New York: ACM Pres, 1994:51 - 58.
  • 6Thomas R K, Sandhu R S. Task-based authorization control (TBAC): a family of models for active and enterprise- oriented authorization management [ C ]//Prcceedings of the IFIP WG11. 3 Workshop on Database Security, 1997:166 - 181.
  • 7彭维,莫蓉,范晓坤,张铁昌.基于消息通信的同步协同设计技术[J].小型微型计算机系统,2001,22(6):670-674. 被引量:11
  • 8Bertino E, Ferrari E, Atluri V. The specification and enforcement of authorization constrains in workflow management systems [J]. ACM Transactions on Information Systems Security, 1999,2( 1 ) :65 - 104.
  • 9Wu S L, Sheth A, Miller J, et al. Authorization and access control of application data in workflow system[J]. Journal of Intelligent Information System, 2002,18( 1 ) : 71 - 94.
  • 10徐洪学,郭秀英,刘永贤.基于RBAC的具有时空约束的工作流授权模型[J].东北大学学报(自然科学版),2006,27(2):217-220. 被引量:6

二级参考文献13

  • 1邢光林,洪帆.一个基于RBAC的工作流授权模型[J].小型微型计算机系统,2005,26(3):544-547. 被引量:6
  • 2林宗楷.协同设计将对设计工作和CAD技术引起的变化[J].软件学报,1998,9:126-131.
  • 3Sandhu R S,Coyne E J,Feinstein H L.Role-based access control models[J].IEEE Computer,1996,39(2):38-47.
  • 4Atluri V,Huang W K.Enforcing mandatory and discretionary security in workflow management systems[J].Journal of Computer Security,1997,5(4):303-339.
  • 5Adam N R,Atluri V,Huang W K.Modeling and analysis of workflows using petri nets[J].Journal of Intelligent Information Systems,1998,10(2):131-158.
  • 6Ahn G J.Injecting RBAC to secure a web-based workflow system[A].In Proceeding of Fifth ACM Workshop on Role-Based Access Control[C].Berlin:ACM,2000.26-28.
  • 7Atluri V,Huang W K,Bertino E.A semantic based execution model for multilevel secure workflows[J].Journal of Computer Security,2000,8(1):3-41.
  • 8Atluri V,Huang W K.A petri net based safety analysis of workflow authorization models[J].Journal of Computer Security,2000,8(2):83-94.
  • 9Kandala S,Sandhu R S.Secure role-based workflow models[EB/OL].http:∥www.list.gmu.edu/confrnc/ifip/i01-rbwm.pdf,2001-10-31.
  • 10Wu S L,Sheth A,Miller J,et al.Authorization and access control of application data in workflow system[J].Journal of Intelligent Information System,2002,18(1):71-94.

共引文献15

同被引文献17

  • 1安毅生,施维颖,李人厚.协同设计系统中一种新的访问控制模型[J].长安大学学报(自然科学版),2004,24(6):88-93. 被引量:1
  • 2徐洪学,刘永贤,郭秀英,盛忠起.一种CSCD系统的角色委托授权模型[J].东北大学学报(自然科学版),2006,27(5):548-551. 被引量:1
  • 3ANDERSON J P. Computer security technology planning study[EB/OL]. [2010-12-03]. http://csrc, nist. gov/publications/history/ande 72. pdf.
  • 4GOLLMANN D. Computer security[M]. New York, N. Y. , USA:John Wiley and Sons, 1999.
  • 5CONWAY R, MAXWELL W, MORGAN H. On the implementation of security measures in information systems[J]. Communications of the ACM, 1972,15(4):211-220.
  • 6DENNING D E. A lattice model of secure information flow [J]. Communications of the ACM, 1976,19(5): 236-243.
  • 7FERRAIOLO D F, KUHN D R. Role-based access controls [C]//Proceedings of the 15th National Computer Security Conference. Baltimore, Md., USA: The Institute, 1992: 554-563.
  • 8SANDHU R, COYNE E, FEINSTEIN H. Role-based access control models[J]. IEEE Computer, 1996,29(2): 38-47.
  • 9SANDHU R S, BHAMIDIPATI V, COYNE E, et al. The ARBAC97 model for role-based administration of roles:preliminary description and outline[C]//Proceedings of the 2nd ACM Workshop on Role-Based Access Control. New York, N. Y. , USA. ACM Press, 1997 : 41-50.
  • 10BERTINO E, BONATTI P A, FERRARI E. TRBAC:a temporal role-based access control model[J]. ACM Transactions on Information and System Security, 2001,4 (3) : 191-223.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部