期刊文献+

一种基于改进RBAC模型的EIS权限管理框架的研究与实现 被引量:13

Research and implementation of authority control framework in EIS based on improved RBAC model
在线阅读 下载PDF
导出
摘要 对基于角色的访问控制(RBAC)模型进行了延伸和拓展,提出了一种细粒度权限控制的改进模型FG-RBAC,并在此模型基础上设计开发了一套能为企业信息系统(EIS)开发者和用户提供更简单、更实用、更快速的数据级权限管理解决方案的管理框架。该框架已在若干个国有大型企业集团EIS的权限管理中获得成功应用。 This paper proposed an improved RBAC model based on fine-grained access control,called FG-RBAC. Using this model,designed and developed an authority control framework for data-level access management solutions. This framework can make the developers and users of enterprise information system more convenient,more practical and more rapid in doing access management. The framework has been applied successfully in a number of large state-owned enterprise groups.
出处 《计算机应用研究》 CSCD 北大核心 2010年第10期3855-3858,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(60773188) 广东省教育部产学研合作计划引导(2009B090300309)
关键词 基于角色的访问控制 企业信息系统 细粒度权限控制 数据级授权 权限框架 RBAC( role-based access control) enterprise information system ( EIS) fine-grained access control data-level authority authority control framework
  • 相关文献

参考文献8

  • 1FERRAIOLO D F, KUHN R. Role-based access controls[ C ]//Proc of the 15th NIST-NCSC National Computer Security Conference. 1992:554- 563.
  • 2SANDHU R, COYNE E J, FEINSTEIN H L. Role-based access control models [J]. IEEE Computer,1996,29(2) :38-47.
  • 3International Committee for Information Technology Standards (INCITS). ANSIINCITS 359-2004, American national standard for information technology:role-based access control[ S]. 2004.
  • 4FERRAIOLO D F, SANDHU R, GAVRILA S, et al. Propoesd NIST standard for role-based access control [J]. ACM Trans on Information and System Security, 2001,4(3) :224- 274.
  • 5FERRAIOLO D F, KUHN R, CHANDRAMOULI R. Role-based access control[ M]. 2nd ed. Norwood, MA: Artech House, 2007.
  • 6翟征德,冯登国,徐震.细粒度的基于信任度的可控委托授权模型[J].软件学报,2007,18(8):2002-2015. 被引量:34
  • 7吴江栋,李伟华,安喜锋.基于RBAC的细粒度访问控制方法[J].计算机工程,2008,34(20):52-54. 被引量:23
  • 8李细雨,韩建民,于娟,童隽.基于粒逻辑的扩展RBAC模型[J].浙江师范大学学报(自然科学版),2009,32(3):303-307. 被引量:6

二级参考文献27

  • 1刘清,黄兆华.G-逻辑及其归结推理[J].计算机学报,2004,27(7):865-873. 被引量:28
  • 2周文峰,尤军考,何基香.基于RBAC模型的权限管理系统设计与实现[J].微计算机信息,2006(05X):35-36. 被引量:26
  • 3唐柳英,卿斯汉.混合RBAC-DTE策略的多角色管理[J].计算机学报,2006,29(8):1419-1426. 被引量:13
  • 4Ferraiolo D,Kuhn R.Bole Based Access Controls[C]//Proceedings of the 15th NIST-NCSC National Computer Security Conference.Bahi-more:NIST-NCSC,1992:554-563.
  • 5Saodhu R,Coyne E J,Feinstein H L.Bole-Based Access Control Models[J].IEEE Computer,1996,29(2):3847.
  • 6Ferraiolo D,Sandhu R,Gavrila S.Proposed NIST standard for role-based access control[J].ACM Transactions on Information and System Secu-rity,2001,4(3):224-274.
  • 7翟征德,冯登国,徐震.细粒度的基于信任度的可控委托授权模型[J].软件学报,2007,18(8):2002-2015. 被引量:34
  • 8Sandhu RS,Coyne EJ,Feinstein HL,Youman CE.Role-Based access control models.IEEE Computer,1996,29(2):38-47.
  • 9ANSI INCITS 359-2004.Role based access control.American National Standard for Information Technology,2004.
  • 10Ferraiolo DF,Cugini J,Kuhn DR.Role-Based access control (RBAC):Features and motivations.In:Proc.of the 11th Annual Computer Security Application Conf.New Orleans:IEEE Computer Society Press,1995.241-248.

共引文献57

同被引文献90

引证文献13

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部