期刊文献+

层次化角色的受限授权模型研究

Research on hierarchical role-based constrained delegation model
在线阅读 下载PDF
导出
摘要 针对现有用户-用户的层次化角色授权模型存在授权冲突问题,基于授权的时限和约束限制规则,对层次化角色的授权组件、相关性质以及互斥角色的约束限制规则进行了描述。提出了一种层次化角色的受限授权模型,该模型满足最小特权和职责分离两安全原则。给出了角色授权的生成和撤销算法,并对该模型的正确性和完整性进行了讨论。最后给出了实现该模型的体系架构,并通过应用实例验证了模型的有效性和实用性,较好地解决了角色层次上的授权冲突问题。 Existing user-user hierarchical role-based delegation models do not solve the problem of delegating conflicts. Role-based delegation module of RBAC with its properties and constraint rules are described and a hierarchical role-based constrained delegation model (HRCDM) is presented, which satisfies least privilege and separation of duty principles. A delegation algorithm and a revocation algorithm are given, and then the soundness and completeness of HRCDM is discussed. Finally, HRCDM is achieved in a system structure, and is proved available and useful by a delegation application example. The problem of delegating conflicts is solven efficiently.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第15期3843-3845,3855,共4页 Computer Engineering and Design
关键词 基于角色的访问控制 层次化角色 授权 约束规则 授权撤销 RBAC hierarchical roles delegation constrained rules revocation
  • 相关文献

参考文献11

  • 1Barka E,Sandhu R.Framework for role-based delegation models [C].Proceedings of the 16th Annual Computer Security Applications Conference,New Orleans:IEEE Press,2000:168-176.
  • 2Sandhu R, Bhamidipati V, Munawer Q. The ARBAC97 model for role-based administration of roles[J].ACM Transactions on Information and System Security, 1999,2(1): 105-135.
  • 3李帆,郑纬民.基于角色与组织的访问控制模型[J].计算机工程与设计,2005,26(8):2136-2140. 被引量:27
  • 4林颖莹,曹奇英,周晶晶,王春杰.基于角色的工作流多层访问控制安全模型[J].计算机工程与设计,2007,28(10):2306-2308. 被引量:2
  • 5Barka E,Sandhu R.A role-based delegation model and some extensions[C].Proceedings of 23rd National Information Systems Security Conference,Baltimore:NIST,2000:101-114.
  • 6Zhang L H,Ahn G J,Chu B T.A rule-based framework for rolebased delegation[J].ACM Trans on Information and System Security,2003,6(3):404-441.
  • 7Barka E, Sandhu R. Role-based delegation model/hierarchical roles(RBDM1)[C].Proceedings of the 20th Annual Computer Security Application Conference, Washington, DC: IEEE Press, 2004:396-404.
  • 8洪帆,段素娟,黎成兵.基于图的委托授权模型[J].北京邮电大学学报,2005,28(6):5-7. 被引量:7
  • 9徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 10ANSI INCITS 359-2004. Role based access control [EB/OL]. http://csrc.nist.gov/rbac/.

二级参考文献50

  • 1刘璟,周明天.基于SPKI证书的CORBA分布式授权服务[J].北京邮电大学学报,2003,26(z1):81-88. 被引量:1
  • 2邢光林,洪帆.基于角色和任务的工作流访问控制模型[J].计算机工程与应用,2005,41(2):210-213. 被引量:42
  • 3李帆,郑纬民.基于角色与组织的访问控制模型[J].计算机工程与设计,2005,26(8):2136-2140. 被引量:27
  • 4穆美好.基于两级角色管理的访问控制[J].计算机工程与设计,2006,27(8):1465-1467. 被引量:4
  • 5范玉顺.工作流管理技术基础[M].北京:清华大学出版社,施普林格出版社,1999..
  • 6Xu Z, Feng DG, Li L, Chen H. UC-RBAC: A usage constrained role-base access control model. In: Qing SH, Gollmann D, Zhou JY, eds. Proc. of the 5th Int'l Conf. on Information and Communications Security. LNCS 2836, Heidelberg: Springer-Verlag, 2003.337-347.
  • 7Gasser M, McDermott E. An architecture for practical delegation in a distributed system. In: Cooper D, Lunt T, eds. Proc. of the1990 IEEE Computer Society Symp. on Research in Security and Privacy. Oakland: IEEE Computer Society Press, 1990. 20-30.
  • 8Gladny HM. Access control for large collections. ACM Trans. on Information Systems, 1997,15(2):154-194.
  • 9Moffett JD, Sloman MS. The source ofauthority for commercial access control. IEEE Computer, 1988,21(2):59-69.
  • 10Nagaratnam N, Lea D. Practical delegation for secure distributed object environments. Distributed Systems Engineering, 1998,5(4):168-178.

共引文献86

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部