期刊文献+

基于角色和任务的数据库使用控制授权模型

Usage Control Authorization Model for Database Based on Role and Task
在线阅读 下载PDF
导出
摘要 在使用控制(UCON)模型的基础上纳入角色管理和任务管理的思想,进行约束扩展,构建了一个基于角色和任务的数据库使用控制授权模型RTB-UCON,允许在数据库资源使用前、使用中、使用后对授权规则、义务、条件和约束等限制进行判断,并根据主体活动更新主体和/或客体属性,实现决策的连续性和属性的可变性.同时,角色实现了用户管理的灵活性,任务实现了权限分配的动态性,约束有效避免角色和任务等冲突的产生.最后,通过应用实例分析,说明了模型的可行性. On the basis of usage control(UCON)model, the idea of the role and task management is adopted. A database usage control model named RTB-UCON with constraint extended, is constructed based on role and task. According to the judgment of authorization rule, obligation, condition and constraint, before usage, during usage or after usage, the usage decision can be made or updated, and attributes of subjects and/or objects are allowed to vary, which settle the problems of continuity of decisions and mutability of attributes. Role is employed to realize the flexibility of user management and the task is used to manage the permissions dynamically. Moreover, the role conflict and task conflict are avoided by constraint. At last, analysis of an application is provided to proof the feasibility of RTB-UCON.
出处 《东华大学学报(自然科学版)》 CAS CSCD 北大核心 2012年第4期435-442,共8页 Journal of Donghua University(Natural Science)
基金 国家核高基资助项目(2010ZX01042-001-003)
关键词 使用控制 角色 任务 控制模型 usage control role task control model
  • 相关文献

参考文献15

  • 1PARK J, SANDHU R. Towards usage control models: Beyond traditional access control[C]// Proceedings of the 7th ACM Symposium on Access Control Models and Technologies. Monterey Colifonia: ACM Press, 2002 : 57-64.
  • 2SANDHU R. Relational database access controls [M]// Handbook of Information Security Management ( 1994 - 1995 Yearbook). Pennsauken, NJ: Auerbach Publishers, 1995: 145-160.
  • 3SANDHU R. Mandatory controls for database intergrity[C]// Proc of the IFIP WG11.3 Workshop on Database Security. Monterey Colifonia, 1989 : 143-150.
  • 4SANDHU R. Access control: The neglected frontier[C]//In Proceedings of the First Australasian Conference on Information Security and Privacy. Wollongong, 1996:23-26.
  • 5FERRAIOLO D, CUGINI J, KUHN D. Role-based access control(RBAC): Features and motivations [C]//Proc of the llth Annual Computer Security Application Conf. New Orleans: IEEE Computer Society Press, 1995:241-248.
  • 6SANDHU R, COYNE E, FEINSTEIN H. Role-based access control models[J]. IEEE Computer, 1996,29(2) : 38-47.
  • 7ANSI INCITS 3594-2004. Role based access control[S]// American Nation Standard for Information Technology.
  • 8THOMAS R, SANDHU R. Task-based authorization control: A family of model for active and enterprise oriented authorization management [C]// Proceedings of the IFIP Workshop on DataBase Security. Lake Tahoe, 1998=53-60.
  • 9赵秀凤,郭渊博.一种基于角色和任务的访问控制模型[J].微计算机信息,2007(33):63-64. 被引量:8
  • 10PARK J, SANDHU R. The UCONABC usage control model[J]. ACM Transaction on Information and System Security, 2004,7 (1) : 128-174.

二级参考文献30

  • 1李芳,范玉妹,胡志兴.操作系统安全模型研究及方案设计[J].微计算机信息,2004,20(9):126-128. 被引量:10
  • 2刘益和,刘嘉勇.一个基于角色的信息流模型及应用[J].四川大学学报(工程科学版),2004,36(5):94-97. 被引量:7
  • 3Xu Z, Feng DG, Li L, Chen H. UC-RBAC: A usage constrained role-base access control model. In: Qing SH, Gollmann D, Zhou JY, eds. Proc. of the 5th Int'l Conf. on Information and Communications Security. LNCS 2836, Heidelberg: Springer-Verlag, 2003.337-347.
  • 4Gasser M, McDermott E. An architecture for practical delegation in a distributed system. In: Cooper D, Lunt T, eds. Proc. of the1990 IEEE Computer Society Symp. on Research in Security and Privacy. Oakland: IEEE Computer Society Press, 1990. 20-30.
  • 5Gladny HM. Access control for large collections. ACM Trans. on Information Systems, 1997,15(2):154-194.
  • 6Moffett JD, Sloman MS. The source ofauthority for commercial access control. IEEE Computer, 1988,21(2):59-69.
  • 7Nagaratnam N, Lea D. Practical delegation for secure distributed object environments. Distributed Systems Engineering, 1998,5(4):168-178.
  • 8Bandmann O, Dam M, Firozabadi BS. Constrained delegation. In: Proc. of thc 23rd Annual IEEE Symp. on Security and Privacy.Oakland: IEEE Computer Society Press, 2002. 131-143. http://csdl.computer.org/comp/proceedings/sp/2002/1543/00/15430131abs.htm
  • 9Niezette M, Stevenne J. An efficient symbolic representation of periodic time. In: Finin TW, Nicholas CK, Yesha Y, eds. Proc. of the 1st Int'l Conf. on Information and Knowledge Management. LNCS 752, Springer-Verlag, 1992.
  • 10Ferriaolo D, Cugini J,Kuhn R. Role-Based access control (RBAC): Features and motivations. In: Proc. of the 11th Annual Computer Security Application Conf. New Orleans: IEEE Computer Society Press, 1995. 241-248. http://csrc.nist.gov/rbac/ferraiolo-cugini-kuhn-95.pdf

共引文献58

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部