期刊文献+

医院信息系统访问控制策略设计分析 被引量:2

Design and Analysis of Access Control Strategy for Hospital Information System
在线阅读 下载PDF
导出
摘要 今天的医院信息系统(HIS)与先进的计算机、网络、通讯技术融合的速度越来越快,这虽然大大提升了医院各项业务信息化程度,但受传统信息安全策略固有缺陷的限制,同时也增大了越权行为、信息泄露信息安全事故的可能性。为解决这些问题,在信息系统安全目标和安全需求分析的基础上,提出了一种基于时间、空间环境制约因素的角色访问控制技术和一种在分布式环境下层次化的授权策略。本模型在角色访问控制模型的基础上,增加了时间和空间两个制约因素,能够使医院信息系统更加安全,降低访问控制事故的风险,为网络安全防护产生更大的技术效益。 Nowadays,advanced computer,network and communication technologies are greatly adopted in HIS,which enhanced information degree of hospital's business.But with inherent defects of traditional information safety strategy,it is easy for employees to overstep and give away information.To solve these safety problems,gives a role access control strategy based on time and location,based on research of safety targets and requirements of information system.Also,gives a hierarchical authorization strategy under distributed environment.Based on role access control strategy,this strategy adds time and space two constrains,so as to make HIS more safe,reduce role access control risks,and provide more technical benefit to network safety protection.
作者 赵锋 曹文杰
出处 《计算机技术与发展》 2010年第6期144-147,共4页 Computer Technology and Development
关键词 医院信息系统 角色访问控制策略 授权策略 信息资源 信息安全 hospital information system role access control strategy authorization strategy information resource information safety
  • 相关文献

参考文献8

  • 1朱莹,金凌紫,朱鸿.医院信息系统安全性需求分析与总体设计初探[J].计算机系统应用,1998,7(8):2-5. 被引量:3
  • 2Sandhu R S,Coyne E J,Feinstein H,et al.Role-based Ac-cess Control Models[J].IEEE.Computer,1996,29(2):38-47.
  • 3O'Neil M,Allam-Baker P,Cann S M,et al.Web Services Security[M].[s.1.] :McGraw-Hill,2003.
  • 4Ferraiolo D F.Proposed NIST Standard for Role-based Ac-cess Control[J].ACM Transactions on Information and Sys-tem Security,2001,4(3):224-250.
  • 5Joshi J B D,Bertino E,Latif U,et al.A Generalized Tempo-ral Role-based Access Control Model[J].IEEE Transactions on Knowledge and Data Engineering,2005,7(1):4-23.
  • 6董理君,余胜生,杜敏,周敬利.一种基于环境安全的角色访问控制模型研究[J].计算机科学,2009,36(1):51-54. 被引量:12
  • 7Kandala S,Sandhu R.Secure Role-Based Workflow Models[C] //In:proceedings of the 15th IFIP WG 11.3Working Conference on Database Security.Niagara,Ontario,Canada:[s.n.].2002:45-58.
  • 8颜学雄,王清贤,马恒太.Web服务访问控制模型研究[J].计算机科学,2008,35(5):38-41. 被引量:11

二级参考文献61

  • 1王瑜,卿斯汉.一种新的访问控制模型——TBPM-RBAC[J].计算机科学,2005,32(2):169-172. 被引量:7
  • 2欧阳凯,周敬利,夏涛,余胜生.基于SSL VPN接入机制的研究[J].计算机科学,2005,32(5):59-63. 被引量:7
  • 3李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133. 被引量:52
  • 4Sandhu R S, Coyne E J, Feinstein H, et al. Role-based access control models. IEEE Computer, 1996,29 (2) : 38-47
  • 5Joshi J B D, Bertino E, Latif U, et al. A generalized temporal role-based access control model. IEEE Transactions on Knowledge and Data Engineering, 2005,7 (1) : 4-23
  • 6Covington M J,Sastry M R, Manohar D J. Attribute-based Authentication Model for Dynamic Mobile Environments//Proc. of the 3rd International Conference of Security in Pervasive Computing. 2006: 227-242
  • 7Shafiq B,Joshi J B D,Bertino E,et al. Secure Interoperation in a Multidomain Environment Employing RBAC Policies. IEEE Transactions on Knowledge and Data Engineering, 2005, 17 (11) : 1557-1577
  • 8Covington M J, Long W, Srinivasan S, et al. Securing context-aware applications using environment roles//Proc, of the 6th ACM Symposium on Access Control Models and Technologies. 2001:10-20
  • 9Teo L, Ahn G J, Zheng Y L. Dynamic and Risk-aware Network Access Management//Proc. of the 7th ACM Symposium on Access Control Models and Technologies. 2003:217-230
  • 10Chakraborty S, Ray I. TrustBAC Integrating Trust Relationships into the RBAC Model for Access Control in Open Systems //Proc. of the llth ACM Symposium on Access Control Models and Technologies. 2006:49-58

共引文献22

同被引文献12

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部