期刊文献+

带有空间特性角色约束 被引量:5

Role-Based Constraints with Spatial Characteristics
在线阅读 下载PDF
导出
摘要 空间数据库系统和基于移动用户位置的信息服务系统对访问控制模型具有特殊要求——用户地理位置的变化通常会引起用户权限的动态变化.提出一个支持空间特性的角色访问控制模型Spatial-RBAC,详细讨论了在空间环境下的空间区域约束、空间职责分离约束和空间角色激活基数约束.这些约束分别用来控制角色分配、角色状态改变、角色权限分配和角色激活等操作,给传统的基于角色的访问控制模型增加了空间安全描述能力.在安全空间数据库应用中,为了有效地标识用户地理位置的变化,避免不必要的计算,还给出了判断用户当前扮演的角色集的有效作用域的算法,提高了Spatial-RBAC模型的实用性. Spatial database systems and location based services share a common access control requirement, i. e. , the same user will be assigned different access rights when this user moves into different spatial extent. The access permissions assigned to users are based on their present locations. The novel access control model is badly needed to cope with this scenario that the user's access rights are mutable. An access control model with spatial characteristics named as Spatial-RBAC is proposed. We study the main components of the model, such as spatial area constraints, separation of duties spatial constraint and spatial cardinality constraint of role activation. These constraints can control the assignment of roles, the change of role state, the assignment of privileges, the activation of roles and etc, which strengthen the security capability. In the model applications, we have developed some location iudging algorithms to identify effectively the change of the user locations and improve the practicability of Spatial-RBAC.
出处 《计算机辅助设计与图形学学报》 EI CSCD 北大核心 2008年第10期1374-1382,共9页 Journal of Computer-Aided Design & Computer Graphics
基金 国家自然科学基金(60603041 60773049) 江苏省自然科学基金(BK2006073) 江苏大学高级人才启动基金(07JDG031)
关键词 空间数据库 基于角色的访问控制 空间约束 基于位置服务 spatial database role based access control spatial constraints location-based service
  • 相关文献

参考文献13

  • 1Bertino E, Catania B, Damiani M L, et al. GEO-RBAC: a spatially aware RBAC [C] //Proceedings of Symposium on Access Control Models and Technologies, Stockholm, 2005: 29-37
  • 2Hansen F, Oleshchuk V. Spatial role-based access control model for wireless networks [C]//Proceedings of IEEE Vehicular Technology Conference, Orlando, 2003: 2093- 2097
  • 3Ahn G J, Sandhu R. Role based authorization constraints specification [J]. ACM Transactions on Information and System Security, 2000, 3(4): 207-226
  • 4Ahn G J. The RCL 2000 language for specifying role-based authorization constraints [D]. Fairfax: George Mason University, 1999
  • 5Joshi J B D, Bertino E, Shafiq B, et al. Dependencies and separation of duty constraints in GTRBAC [C]//Proceedings of ACM Symposium on Access Control Models and Technologies, Como, 2003:51-64
  • 6Jaeger T. On the increasing importance of constraints [C] // Proceedings of the 4th ACM Workshop on Role Based Access Control, Fairefax, 1999:33-42
  • 7Ahn G J. Specification and classification of role based authorization policies [C]//Proceedings of the 12th IEEE International Workshops on Enabling Technologies Infrastructure for Collaborative Enterprises, Linz, 2003: 202-207
  • 8Joshi J B D, Bertino E, Latif U, el al. A generalized temporal role-based access control model [J]. IEEE Transactions on Knowledge and Data Engineering, 2005, 17 (1): 4-23
  • 9Bertino E, Bonatti P A, Ferrari E. TRBAC: a temporal role-based access control model[J]. ACM Transactions on Information and System Security, 2001, 4(3): 191-223
  • 10鞠时光.可视化空间数据库查询语言CQL[J].计算机学报,1999,22(2):205-211. 被引量:18

共引文献17

同被引文献51

  • 1陈廷斌,鲁艳霞,袁磊.面向动态服务的物联网Web Services组合调度方法研究[J].情报杂志,2011,30(S2):134-137. 被引量:4
  • 2郭树行,张禹,王坚.基于情景演算的物联网访问控制模型[J].中南大学学报(自然科学版),2013,44(S1):176-180. 被引量:2
  • 3张宏,贺也平,石志国.一个支持空间上下文的访问控制形式模型[J].中国科学(E辑),2007,37(2):254-271. 被引量:22
  • 4林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966. 被引量:70
  • 5Sandhu R,Coyne EJ,Feinstein HL,et al.Role-Based access control models[J].IEEE Computer,1996,29(2):38-47.
  • 6Hansen F,Oleshchuk V.Spatial role-based access control model for wireless networks[C].Proceedings of IEEE Vehicular Technology Conference,Orlando:IEEE,2003:20932-2097.
  • 7Bertino E,Catania B,Damiani M L,et al.GEO-RBAC:spatially aware RBAC[C].PP Proceedings of Symposium on Access Cont rol Models and Technologies,Stockholm:ACM,2005:29-37.
  • 8Liliana Kasumi Sasaoka,Claudia Bauzer Medeiros.Access Control in Geographic Databases[C].Berlin Heideueny:Springer-Verlag,2006:110-119.
  • 9X Cui,Y Chen,J Gu.Ex-RBAC:An Extended Role Based Access Control Model for Location-aware Mobile Collaboration System[C].Int Conf on Internet Monitoring and Protection (ICIMP),California:IEEE,2007:36-42.
  • 10OGC 99-049,OpenGIS simple Features Specification for SQL[S].

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部