期刊文献+

基于时序角色的TGIS访问控制模型

A Temporal Role-Based Access Control Model of TGIS
在线阅读 下载PDF
导出
摘要 随着物联网、5G和边缘计算等技术的快速发展,时态地理信息系统(temporal geographical information system,TGIS)面临复杂多变的安全环境和访问控制需求。针对时序地理授权机制僵化、缺乏动态适应性等问题,提出了基于时序角色的TGIS访问控制模型。该模型对基于角色访问控制模型的用户、对象、角色、权限进行了扩展,增加了时序约束和空间属性,实现了对用户访问行为的精细化管控,支持基于角色、时间与位置的多维度分层次动态授权,访问控制机制更灵活有效。模型降低了TGIS系统用户权限维护的复杂度,在实际应用中取得了较好的效益。 With the rapid development of technologies such as the Internet of Things,5G,and edge computing,the temporal geographic information system(TGIS)faces a complex and ever-changing security environment and access control requirements.To address the rigidity and lack of dynamic adaptability of the temporal geographic authorization mechanism,a TGIS access control model based on temporal roles was proposed.This model extended the user,object,role,and permission of the role-based access control model,adding temporal constraints and spatial attributes,achieving refined control over user access behavior and supporting multi—dimensional and hierarchical dynamic authorization based on role,time,and location.The access control mechanism was more flexible and effective.The model reduced the complexity of user permission maintenance in the TGIS system and had achieved good benefits in practical applications.
作者 高小伍 何菲 GAO Xiaowu;HE Fei(Information and Data Managerment Center East China University of Science and Technology,Shanghai 200237,China)
出处 《电脑与信息技术》 2025年第6期77-80,共4页 Computer and Information Technology
关键词 时态地理信息系统 访问控制 时序特征 TGIS access control temporal feature
  • 相关文献

参考文献4

二级参考文献54

  • 1徐晨,朱润酥,吴振洲,纪添,李晨希.访问控制安全模型研究[J].网络空间安全,2024,15(1):97-102. 被引量:3
  • 2Ferraiolo D F, Sandhu R, Gavrila S, et al. Proposed NIST standard for role-based access control [J]. ACM Transactions on Information and System Security, 2001, 4 (3):224-274.
  • 3Bammigatti P H. Generic WA-RBAC: role based access control model for web applications [C]. Proceedings of the 9th Inter- national Conference on Information Technology. Bhubaneswar, India.. IEEE Computer Society, 2006: 237-240.
  • 4Takahi H, Amini M, Jalili R Enhacing role-based access control model through fuzzy relations [C]. Proceedings of the Third Inter- national Symposium on Information Assurance and Security. Man- chester, UK: IEEEComputer Society, 2007: 131-136.
  • 5ZHANG Dong-wen, PEI Xing, QIU Ji-Qing, et al. A delegation model for time constraims-based TRBAC [C]. Proceedings of the Eighth International Conference on Machine Learning and Cybemetics Baoding, China: IEEE Press, 2009: 2027-2032.
  • 6Ardagna C, Cremonini M, Damiani E, et al. Supporting location- based conditions in access control policies [C]. Proceedings of the ACM Symposium on Information, Computer and Communications Security. Taipei, Taiwan : ACM Press, 2006: 212-222.
  • 7Damiani M, Bertino E, Catania 13. GEO-RBAC: a spatially aware RBAC [J]. ACM Transactions on Information and Sys- tem Security, 2007, 10 (1): 1-42.
  • 8LIU Song-yun, HUANG He-jiao. Role-based access control for distributed cooperation environment [C]. Proceedings of Interna- tional Conference on Computational Intelligence and Security. Bei jing, China: IEEEComputer Society, 2009: 455-459.
  • 9WU Xian, QIAN Pei-de. Research on policy domain access control model in distributed systems [C]. Proceedings of Nine International Conference on E-Business and Information System Security. Wuhan, China: IEEEPress, 2009: 1-6.
  • 10LI Fenghua, WANG Wei, MA Jianfeng, et al. Action-based access control for web services [J]. Journal of Information Assurance and Security, 2010, 5 (3): 162-170.

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部