期刊文献+

数据库安全代理的基于角色访问控制模型 被引量:4

Role based access control model for database security proxy
下载PDF
导出
摘要 针对信息战下数据库安全代理对访问控制的特殊需求,提出了数据库安全代理(DSP)扩展的基于角色访问控制模型(DSP RBAC).该模型形式化地定义了权限的各个方面,包括操作、属性、动作、客体以及它们之间的关系.通过引入客体包含关系(OIR)和操作级联关系(COR),研究了DSP对关系数据库管理系统的认知问题.在分析操作级联关系的级联需求和继承激活基础上,阐述了对会话需求权限和会话激活权限的影响,并给出在新模型下进行访问控制决策的原则.实验结果表明,该模型解决了在数据库安全代理中应用访问控制策略的操作、客体相关性问题,能够显著提高关键应用的安全性. To meet the special requirements of access control policies for database security proxy (DSP) in information warfare, an extended role based access control (DSP-RBAC) model was proposed. The model formalized various aspects of permissions including operations, properties, actions, objects and relationships among them. By introducing the object inclusion relationship (OIR) and the cascaded operation relationship (COR), the cognition issues of DSP on relational database management system were studied. Based on analysis of the cascaded requirement property and the inherited activation property of COR, the impacts on required permissions and activated permissions were discussed, and the principles to make access control decision were presented by concerning OIR and COR. Experimental results show that the DSP-RBAC model solves the operation-object relativity issues and remarkably improves the security when the access control policies are deployed in database security proxy for critical applications.
出处 《浙江大学学报(工学版)》 EI CAS CSCD 北大核心 2005年第3期342-347,共6页 Journal of Zhejiang University:Engineering Science
基金 防预研资金资助项目(45.6.1 017).
关键词 信息战 数据库安全代理 基于角色的访问控制 Electronic warfare Formal languages Information management Security of data
  • 相关文献

参考文献10

  • 1蔡亮,杨小虎,董金祥.信息战下的数据库安全——我国的特殊需求分析和对策[J].计算机研究与发展,2002,39(5):568-573. 被引量:23
  • 2FERRAIOLO D F, KUHN R. Role-based access controls[A]. 15th NIST-NCSC National Computer Security Conference[C]. Baltimore, MaryLand: NIST-NCSC,1992: 554-563. 被引量:1
  • 3蔡亮.[D].杭州:浙江大学,2002. 被引量:1
  • 4FERRAIOLO D F, GILBERT D M, LYNCH N. An examination of federal and commercial access controlpolicy needs[A]. Proceedings of the 16th National Computer Security Conference [C]. Baltimore, MaryLand:NIST-NCSC, 1993: 107-116. 被引量:1
  • 5SANDHU R S, COYNE E J, FEINSTEIN H L, etal.Role-based access control models[J]. IEEE Computer,1996, 29(2): 38-47. 被引量:1
  • 6FERRAIOLO D F, SANDHU R S, GAVRILA S, et al. A proposed standard for role-based access control[J]. ACMTransaction on Information and System Security, 2001,4(3): 224 -274. 被引量:1
  • 7OSBORN S, SANDHU R S, MUNAWER Q. Configuring role-based access comrol to enforce mandatory and discretionary access control policies[J]. ACM 1tmmaction on Information and System Seeurity, 2000,3(2) : 85 - 106. 被引量:1
  • 8黄益民,杨子江,平玲娣,潘雪增.安全管理系统中基于角色访问控制的实施方法[J].浙江大学学报(工学版),2004,38(4):408-413. 被引量:21
  • 9AHN G J, SANDHU R S. Role-based authorization constraints specification[J]. ACM Transaction on Information and System Security, 2000,3(4):207 - 226. 被引量:1
  • 10MOYER M J, AHAMAD M. Generalized role- based access control[A]. Proceedings of the 21st International Conference on Distributed Computing Systems(ICDCS2001)[C]. Phoenix, Arizona, USA:IEEE Computer Society, 2001 : 391 - 398. 被引量:1

二级参考文献14

  • 1SANDHU R S,COYNC E J,FCINSTCIN H L,et al.Role-based access control model [J]. IEEE Computer,1996,29(2) :38-47. 被引量:1
  • 2SANDHU R S,FERRAIOLO D,KUHN R. The NIST model for role-based access control: Towards a unified standard[A]. Proceedings of the Fifth ACM Workshop on Role Based Access Control [C]. Berlin, Germany:ACM, 2000: 47- 63. 被引量:1
  • 3JAEGER T,GIRAUD F,ISLAM N ,et al. A role-based access control model for protection domain derivation and management. [A] Proceedings of the Second ACM Workshop on Role-Based Access Control[C]. Fairfax,Virginia ,USA ..ACM, 1997: 95- 108. 被引量:1
  • 4EPSTEIN P,SANDHU R S. Towards a UML based approach to role engineering [A]. Proceedings of the Fourth ACM Workshop on Role-Based Access Control[C]. Fairfax, Virginia, USA: ACM, 19 9 9: 135 - 143. 被引量:1
  • 5SANDHU RAVI S,BHAMIDIPATI V,COYNE E,et al. The ARBAC97 model for role-based administration of roles: Preliminary description and outline[A]. Proceedings of the Second ACM Workshop on Role-Based Access Control [C]. Fairfax, Virginia, USA: ACM,1997: 41-50. 被引量:1
  • 6SANDHU RAVI S,MUNAWER Q. The ARBAC99model for administration of roles [A]. Proceedings 15th Annual Computer Security Applications Conference [C]. Phoenix,Arizona,USA: IEEE Computer Society,1999: 229-238. 被引量:1
  • 7FERNANDEZ E B,HAWKINS J C. Determining role rights from use casesIn[A]. Proceedings of the SecondACM Workshop on Role-Based Access Control [C].Fairfax,Virginia, USA: ACM, 1997: 121 - 126. 被引量:1
  • 8GIFFORD D K,JOUVELOT P,SHELDON M A,et al. Semantic file systems [A]. Proceedings of the Thirteenth ACM SIGOPS Symposium on Operating Systems Principles [C]. Pacific Grove, CA, USA:ACM,1991:16-25. 被引量:1
  • 9陈越,张斌,金保华.用安全约束处理实现多级安全数据库管理[J].郑州轻工业学院学报,1997,12(4):14-18. 被引量:2
  • 10闵锐,余祥宣.ORACLE 7 多级安全加密系统的设计和实现[J].华中理工大学学报,1998,26(5):75-77. 被引量:3

共引文献42

同被引文献6

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部