摘要
文中介绍了军用访问控制模型和基于角色的访问控制模型,对军用访问控制模型进行了分析,指出它们缺点和存在的问题;在不改变系统原有安全标记的基础上,用基于角色的访问控制模型对军用的 BLP 模型和它的变化形式进行了改造,并给出了证明,从而建立了新的访问控制模型。
This article introduces the military and role-based access control model. Through the analysis of the military access control models, the authors reveal their defects and the problems in existence. This article reconstructs the military BLP models using the role-based access control model without varying the security mark of original system, and offers its proof, thus building a new access control model.
出处
《电子科技》
2004年第6期18-22,共5页
Electronic Science and Technology
关键词
访问控制
RBAC
LBAC
MAC
Access control
RBAC (Role-Based Access Control)
LBAC (Lattice-Based Access Control)
MAC (Mandatory Access Control)