期刊文献+

RBAC模型中角色互斥研究及应用 被引量:3

Research and Application of Exclusion Role in RBAC Model
在线阅读 下载PDF
导出
摘要 应用系统的用户数量和系统角色越来越多,使得角色间的互斥也更加频繁。而角色互斥作为一种实施职责划分的有效手段,在基于RBAC模型的访问控制中具有非常重要的作用。目前关于角色互斥的研究还不够完善,为了更好地处理角色间的互斥关系,文中对RBAC下的角色互斥进行了研究,通过分析角色的本质列举了角色互斥的各种类型,并在此基础上设计了角色约束表,通过形式化的方法给出了角色约束表的组建和角色互斥撤消的方式。最后实现了一个带角色互斥检测的角色分配控制器,能够很好地根据角色互斥关系来进行角色分配,并成功应用到了一个简单系统中。 The number of users and system role in application system is more and more,making the characters exclusion more frequent. Mutually exclusive role as a kind of implementation function of duties separation is very important in the RBAC model. In order to study the types of role conflicts,it studies the role mutual exclusion based on this situation,through the analysis of the nature of role list various types of role exclusion,and on this basis the role constraints table is designed,through the formalized method give the role constraints ta- ble form and role exclusive undo way. Finally design a role distribution controller with role conflict detection that perform role distribution according to role exclusion relationship well,is applied to a simple application system successfully.
机构地区 河海大学
出处 《计算机技术与发展》 2012年第12期21-24,28,共5页 Computer Technology and Development
基金 河海大学中央高校基本科研业务费项目(2009B21614) 河海大学自然科学基金(工科类)资助项目(2009421211)
关键词 基于角色的访问控制 角色互斥 角色分配 互斥撤销 RBAC role mutual exclusion role distribution mutual exclusion digestion
  • 相关文献

参考文献12

二级参考文献52

  • 1袁春阳,贺也平,何建波,周洲仪.具有冲突约束的RBAC模型的形式化规范与证明[J].计算机研究与发展,2006,43(z2):498-508. 被引量:2
  • 2胡金柱,陈娟娟.RBAC模型中角色的继承与互斥问题的研究[J].计算机科学,2003,30(11):160-163. 被引量:5
  • 3李栋栋,谭建龙.基于本体的权限管理系统的研究与实现[J].计算机工程,2005,31(13):43-45. 被引量:5
  • 4于海波,车海燕,金淳兆.基于描述逻辑的RB-RBAC授权规则冲突检测方法[J].计算机科学,2006,33(10):101-105. 被引量:4
  • 5[1]Sandhu R, Coyne E J, Youman C E(Editors). Proceddings of the First ACM Workgroup on Role-based Access Control, ACM, 1996
  • 6[2]Sterne D F.A TCB Subset for Integrity and Role-based Access Control. In: 15th National Computer Security Conference,NIST/NSA,1992
  • 7[3]Notargiacomo L, Blaustein B T , McCollum C D.A Model of Integrity and Dynamic Seperation of Duty for a Trusted DBMS. In:Database Security Ⅶ Workshop on Database security, IFIP WG 11,1992
  • 8[4]Clark D, Wilson D R. Evolution of a Model for Computer Integrity.In:Proceedings of 11th National Computer Security Conference: A Postscript.NIST/NSA, 1988
  • 9[5]Nash M J, Poland K R. Some Conundrums Concering Separation of Duty. In:Proceedings of 19901EEE Symposium on Computer Security and Privacy, IEEE, 1990
  • 10Sandhu R,Coyne E,Feinstein H,et al.Role-based Access Control Model[J].IEEE Computer,1996,29(2):38-47.

共引文献24

同被引文献38

引证文献3

二级引证文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部