期刊文献+

基于角色的三维空间访问控制模型 被引量:1

Three-dimensional Space Access Control Model Based on Role
在线阅读 下载PDF
导出
摘要 标准的基于角色访问控制(RBAC)通过角色对用户和权限进行解耦,从受控资源角度来讲是一维的。该文提出可视数据簇的概念,将授权时间维和可视数据簇维引入RBAC中,论述基于角色的三维空间访问控制模型ACBR3D。给出授权约束的可视数据簇维扩充以及ACBR3D的形式化描述。与已有的访问控制模型相比,该模型对受控资源的描述更加精确,访问控制粒度更小。 The normal Role-Based Access Control(RBAC) model configures the model resources through roles, and this model is one-dimensional according to the manipulated resources. This paper proposes a new conception—— visual data muster, gives a three-dimensional access control model ACBR3D, which is based on role, authorized time and visual data muster, and describes the ACBR3D model. The former constraints are extended so that it can describe the visual data muster character. Compared with other models, this model has many merits such as accuracy, flexibility and small granularity.
作者 陈明 王振武
出处 《计算机工程》 CAS CSCD 北大核心 2008年第9期157-158,182,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60072006)
关键词 基于角色的访问控制 可视数据簇 三维 Role-Based Access Control(RBAC) visual data muster three-dimensional
  • 相关文献

参考文献6

二级参考文献22

  • 1[1]Sandhu, R. Issues in RBAC . In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 21~24.
  • 2[2]Jaeger, T. On the increasing importance of constraints. In: Proceedings of 4th ACM Workshop on Role-Based Access Control. Fairefax, VA: ACM Press, 1999. 33~42.
  • 3[3]Ahn, G.-J. The RCL2000 language for specifying role-based authorization constraints [Ph.D. Thesis]. Fairfax, VA: George Mason University, 1999.
  • 4[4]Sandhu, R., Coyne, E.J., Feinstein, H.L., et al. Role-Based access control models. IEEE Computer, 1995,29(2):38~47.
  • 5[5]Chen, Fang, Sandhu, R. Constraints for role-based access control. In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 39~46.
  • 6Ferraiolo DF, Sandhu R, Gavrila S. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 2001,4(3):224-274.
  • 7Osbom S, Sandhu R. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, 2000,3(2):85-106.
  • 8AHN G-J, Sandhu R. Role-Based authorization constraints specification. ACM Transactions on Information and System Security, 2000,3(4):207-226.
  • 9Sandhu R. Issues in RBAC. In: Youman C, Sandhu R, Coyne E, eds. Proceedings of the 1st ACM Workshop on Role-based access control. ACM Press, 1996. 21-24.
  • 10Ferraiolo D, Kuhn R. Role based access control. In: Proceedings of the 15th National Computer Security Conference, National Institute of Standards and National Computer Security Center. 1992. 641-650.

共引文献113

同被引文献6

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部