期刊文献+

基于RBAC企业通用用户权限管理模型设计与应用 被引量:3

Design and Application of The Enterprise' universal privilege management modelBased on RBAC
原文传递
导出
摘要 本文针对基于RBAC的权限管理模型中角色关系复杂,工作效率比较低的缺点,提出以用户组为授权中心的授权模式,再辅之直接对用户授权的解决方法。进行基于角色的企业访问控制分析,设计出企业访问控制的总体框架,进行了系统建模,并付诸应用于系统管理及人事管理模块的功能设计。 This paper was to develop a well general access control system,independent of any platforms.Firstly,the paper had established the Privilege Management System Model based on the RBAC.The role relation of RBAC was complex and the working efficiency of RBAC was quite low.It put forword the thinking of authorization to the user group,which had simplified authorization management.Then this paper had carried enterprise access control analysis on based on the role,designed the frame of the enterprise access control,had carried on modeling of the system.it raises the visit's efficiency,simplifies authorized and the jurisdiction management order of complexity.
作者 夏冬梅
出处 《网络安全技术与应用》 2010年第8期36-38,共3页 Network Security Technology & Application
关键词 RBAC 用户组 系统建模 权限管理系统 RBAC User Group System modeling Privilege Management System
  • 相关文献

参考文献6

二级参考文献14

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2Sandhu R, Coyn E J, Feinstaim H L, et al. Role Based Access Control; A Multi - dimensional View [C]. Florida' s:Proc of 10th Computer Security Application Conf, Orlando.December5 - 9,1994,54 ~ 62.
  • 3Sandhu R, Coyne E J, Feinstein H L, et al. Role Based Access Control Models[J]. IEEE Computer, 1996,29(2): 38
  • 4Ahn G J,Proceedings of 5th ACM Workshop on Role Based Access Control,2000年
  • 5计算机信息系统安全保护等级划分准则.中华人民共和国国家标准GB 17859-1999
  • 6DAVID Ferralolo,RICHARD Kuhn. Role- based access controls[ EB/OL]. In: Proceedings of the 15th National Computer Security Conference,Baltimore, MD, 1992,554 - 563. __ http ://csrc. nist. gov/staff/kuhn/rkhome, html.
  • 7RAVI Sandhu and EDWARD Coyne. Role - based Access Control Models [ J ]. IEEE Computer, 1996,29 (2) :38 - 47.
  • 8David Ferraiolo, Ravi Sandhu ,et,al. Proposed NIST Standard for Role -based Access Control [ J ]. ACM Transactions on Information and System Security ( TISSEC ), 2001,4 ( 3 ) : 224 - 274.
  • 9姜志红,须德.基于Web的信息系统的用户权限设置策略[J].北方交通大学学报,2001,25(2):33-36. 被引量:24
  • 10杨亚平,李伟琴,刘怀宇.基于角色的细粒度访问控制系统的研究与实现[J].北京航空航天大学学报,2001,27(2):178-181. 被引量:27

共引文献54

同被引文献24

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部