期刊文献+

RBAC模型中角色继承的改进 被引量:3

Improvement of Role Inheritance in RBAC Model
在线阅读 下载PDF
导出
摘要 由于角色分层与组织结构无关,导致权限继承不能依赖于系统的组织。提出继承域的概念,建立基于继承域的角色层次模型,给出改进模型的定义、继承规则、约束条件和角色权限求解算法。实例证明改进模型能清晰地反映系统的组织结构,解决权限继承问题。域属性的引入使得角色的层次结构和权限的分级管理简单有效。 Because the role hierarchies have nothing to do with the organization structure, the inheritance of the permission cannot depend on the organization of the system. The "domain concept is introduced and a role hierarchical model based on inherit domain is built as well as the related definition, inherit regulation, constraint condition and the algorithm to compute the permission of the role. It is showed by the sample that the modified model could show the organization structure and solve the permission problem easily. The introduce of the domain property makes the hierarchical administration of power and role hierarchy more simply and effectively.
出处 《火力与指挥控制》 CSCD 北大核心 2012年第9期129-132,共4页 Fire Control & Command Control
基金 国家"863"计划基金资助项目(2010AA7010213)
关键词 角色分层 继承域 权限 组织结构 分级管理 role hierarchy, inherit domain, permission, organization structure, hierarchicaladministration
  • 相关文献

参考文献5

二级参考文献30

共引文献35

同被引文献21

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2徐松,赵曦滨,顾明.网格环境下的分布式RBAC模型框架[J].计算机工程,2006,32(6):163-166. 被引量:5
  • 3邹晓.基于角色的访问控制模型分析与实现[J].微计算机信息,2006,22(06X):108-110. 被引量:21
  • 4邵桂伟,余本功,杨善林.一种针对信息网格RBAC模型私有权限问题的有效解决方案[J].计算机应用研究,2007,24(4):133-135. 被引量:7
  • 5Fuchs L, Preis A. BusiROLE:a model for integrating business roles into identity management[C] //Proc of the 5th International Conference on Trust, Privacy and Security in Digital Business. 2008:128-138.
  • 6Fugkeaw S, Manpanpanich P, Juntrapremjitt S. Exploiting X. 509 certificate and multi-agent system architecture for role-based access control and authentication management[C] //Proc of the 7th IEEE International Conference on Computer and Information Technology. 2007:733-738.
  • 7Sejong O, Sandhu R. A model for role administration using organization structure[C] //Proc of the 7th ACM Symposium on Access Control Models and Technologies. New York:ACM Press, 2002:155-162.
  • 8Sandhu R , Coyne E J, Feinstein H L, et al. Role-based access control models[J] . IEEE Computer, 1996, 29(2):38-47.
  • 9Essmayr W, Probst S, Weippl E. Role-based access controls:status, dissemination, and prospects for generic security mechanisms[J] . Electronic Commerce Research, 2004, 4(1):127-156.
  • 10Lee H, Lee S, Noh B. A new role-based authorization model in a corporate workflow systems[C] //Proc of International Conference on Computational Science and Its Applications. Berlin:Springer, 2004:701-710.

引证文献3

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部