期刊文献+

基于角色访问控制模型约束的OCL描述 被引量:7

Specify RABC Constraints Using Object Constraint Language
在线阅读 下载PDF
导出
摘要 基于角色的访问控制模型(RBAC)凭借其灵活的授权机制、强大的管理功能和完善的安全策略越来越引起人们的研究兴趣,随着研究的不断深入,面向对象的研究方法也逐渐应用到这个模型中,促进了它的迅速发展。UML作为一种强大的建模语言,不只是局限于支持面向对象的分析与设计,还支持从需求分析开始的软件开发的全过程,通过UML的描述可以使理论模型更加直观地应用到实际系统开发。该文使用UML的对象约束语言(OCL)来描述RBAC中的相关约束,使约束描述更加标准化,更有利于系统开发人员对模型的理解和促进RBAC模型的系统开发。 Role-based access control Model is an enabling technology for authorization,managing and enforcing security in large -scale,enterprise -wide systems.The role -based access control has generated great interest among the model researchers and security policy developer.One of important aspects about RBAC is constraints.Although researchers have identified useful constraints using formal specification languages such as RCL2000to specify the constraints,but it is hard for system developer to understand.The Unified Modeling Language(UML )is a general-purpose visual modeling language in which we can specify,visualize,and document the components of a software system.Object Constraint Language(OCL)as the sub-language of UML should be a precise and unambiguous specification.
作者 王卓 冯珊
出处 《计算机工程与应用》 CSCD 北大核心 2003年第21期100-102,109,共4页 Computer Engineering and Applications
关键词 RBAC UML OCL CONSTRAINT 系统安全 访问控制模型 RBAC,UML ,OCL,Constraint ,system security
  • 相关文献

参考文献12

  • 1何海云,张春,赵战生.基于角色的访问控制模型分析[J].计算机工程,1999,25(8):39-41. 被引量:34
  • 2[美]GradyBooth JamesRumbaugh IvarJacobson.UML用户指南[M].北京:机械工业出版社,2001..
  • 3许春根,严悍,刘凤玉.基于角色访问控制技术的UML表示[J].计算机工程与应用,2001,37(8):9-12. 被引量:10
  • 4OMG Web site.Unified Modeling Language Notation Guide[M].Version 1.3,2000.
  • 5Sandhu R,Bhamidipati V.The ARBAC97 Model for Role based Administration of Role :Preliminary Description and Outline[C].In:Proceedings of the 2th ACM Workshop on Role--Based Access Control, ACM. 1997.
  • 6Ravi Sandhu.Rational for the RBAC96 Family of Access Control Models[C].In:Proceedings of 1st ACM Workshop on Role-based Access control, ACM, 1997.
  • 7Sandhu R,Coyne E J.Role-Based Access Control Models[J].IEEE Computer, 1996;29(2) :38---47.
  • 8Gail-Joon Ahn,Ravi Sandhu.Role-based Authorization Constraints Specification[J].ACM Transactions on Information and Systems Security, 2000;3(4).
  • 9Chen F,Sandhu R.Constraints for role based access control[C].In: Proceedings of the 1st ACM Workshop on Role-Based Access Control, Gaithersburg, MD, 1995 : 39-46.
  • 10Pete Epstein,Ravi S Sandhu.Towards a UML Based Approach to Role Engineering[C].In:ACM Workshop on Role-Based Access Control, 1999 : 135-143.

二级参考文献2

共引文献42

同被引文献30

  • 1Jeff Wong.深入理解ASP.NET里的HttpModule机制.2009.
  • 2Jaeger,T.On the increasing importance of constraints[C].In Proceedings of 4th ACM Workshop on Role-Based Access Control,1999.33-42.
  • 3Bertino E,Bettini C,Ferrari E,Samarati P.An access control model supporting periodicity constraints and temporal reasoning[J].ACM Trans.on Database Systems (TODS),1998,23(3):231,285.
  • 4WendyBoggs MichaelBoggs.邱仲潘 等.UML与Rational Rose 2002从入门到精通[M].北京:电子工业出版社,2002..
  • 5Herrmann P,Graw G,Kl'umm H.Compositional Specification and Structured Verification of Hybrid Systems in cTLA[C].LST IEEE International Symposium on Object—oriented Real—time Distributed,1998:335—340.
  • 6Shu Guoqiang,Li Chao,Wang Qing,et a1.Validating Objectedoriented Prototype of Real—time Systems with Timed Automata[C].Proceedings of the 1 3“IEEE International Workshop on Rapid System Prototyping(RSP'02)1074—6005,2002,(2).
  • 7Selic B.The Real—time UML Standard:Definition and Application[C].Proceedings of the 2002 Design,Automation and Test in Europe Conference and Exhibition(DATE.02),2002,(2).
  • 8RoubtsovalE E,van Katwijk J,de Rooij R C M,et a1.Transformation of UML Specification to XTG[C].PSI 2001.LNCS 224_4,Springer—Verlag Berlin Heidelberg,2001:247—254.
  • 9Dominikus Herzberg.UML-RT as a Candidate for Modeling Embedded Real-Time Systems in the Telecommunication Domain[C].In:Robert France,Bernhard Rumpe eds.-UML-'99,LNCS 1723,Berlin Heidelberg:Springer-Verlag,1999:303~338
  • 10Bran Selic.The Real-Time UML Standard:Definition and Application[C].In:Proceedings of the 2002 Design,Automation and Test in Europe Conference and Exhibition(DATE.02),2002,(2)

引证文献7

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部