期刊文献+

RBAC模型中用户代理机制的研究 被引量:6

Research of user Agent mechanism in RBAC model
在线阅读 下载PDF
导出
摘要 针对ASP服务平台用户和服务之间权限分配日趋复杂的问题,提出了一种新的角色访问控制(A_RBAC)模型,利用代理层将平台服务与企业级用户关联,采用分级授权的用户角色访问控制运行机制,实现了用户代理机制下权限访问的区域自治性,并应用轻量级目录访问协议(LDAP)和J2EE技术将其设计实现于合肥市中小企业信息化托管平台。实践证明,该模型有效地降低了权限分配的复杂性。 In order to solve the raore and raore complicated problem of permission assignment between users and services on ASP service platform, A new Role-Based Access Control (A_RBAC) model was proposed, A_RBAC model made platform services associated with enterprise level user by making use of Agent layer, adopted mechanism of user role access control of classification authorization, implemented regional autonomy of permission access in user Agent mechanism and was applied to the platform of information trusteeship of small medium enterprises with Lightweight Directory Access Protocol (LDAP) and Java 2 Platform Enterprise Edition (J2EE) in Hefei city, The results show that the complexity of permission assignment is effectively reduced.
出处 《计算机应用》 CSCD 北大核心 2007年第9期2200-2201,2205,共3页 journal of Computer Applications
基金 合肥市制造业信息化专项基金资助项目(合科[2005]11号) 安徽省高等学校青年教师科研计划项目(2006JQ1013) 合肥工业大学科学研究发展基金资助项目(060503F)
关键词 应用服务提供商 用户代理 基于角色的访问控制 权限 轻量级目录访问协议 ASP user Agent Role-Based Access Control (RBAC) permission Lightweight Directory Access Protocol (LDAP)
  • 相关文献

参考文献6

二级参考文献35

  • 1谢粤芳,丁香乾,侯瑞春.基于Web Service的ASP服务平台的实现研究[J].中国制造业信息化(学术版),2005,34(1):75-78. 被引量:6
  • 2李燕华,丁香乾,侯瑞春.基于领域构件库ASP平台的实现方案[J].中国制造业信息化(学术版),2005,34(2):85-87. 被引量:4
  • 3张平 张凌.基于LDAP目录服务的网络用户政策化管理[J].1999年CERNET年会会议论文集,1999,:222-228.
  • 4[1]Howes T,Smith M,Good G.Understanding and Deploying LDAP Directory Services. Macmillan Technical Publishing, 1999
  • 5[2]Park J S,Sandhu R.Secure Cookies on the Web. IEEE Internet Computing, 2000
  • 6[3]Yialelis N,Lupu E, SIoman M.Role-based Security for Distributed Object Systems. IEEE Fifth Workshops on Enabling Technology:Infrastructure for Collaborative Enterprise, 1996
  • 7[4]Park J S,Ahn G J,Sandhu R. Role-based Access Control on the Web Using LDAP. Database Security XV:Status and Prospects,kluwer, 2002
  • 8[5]Ahn G J, Sandhu R, Kang M,et al. Injecting RBAC to Secure a Webbased WorkFlow System. 5th ACM Workshop on Role-based Access Control, 2000
  • 9[6]Wagner D,Schneier B. Analysis of the SSL 3.0 Protocol. 2nd Usenix Workshop on Electronic Commerce, 1996
  • 10[7]Sandhu R, Coyne E J,FeinStein H L,et al. Role-based Access Control Models. IEEE Computer, 1996

共引文献48

同被引文献38

引证文献6

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部