期刊文献+

RBAC模型与预防网络犯罪 被引量:3

RBAC Model and Prevention of Network Crimeses
下载PDF
导出
摘要 基于角色的访问控制模型(RBAC)是防止非授权访问、预防网络犯罪、保障网络安全的一种重要方法。约束是RBAC中的一组强制性规则,目前对约束的研究主要集中在关系约束、前提约束、数值约束、职责分离约束、势约束和时间约束等方面。对约束规则的研究和在网络系统中应用是从管理层面上预防网络犯罪的有效方法之一。 RBAC (Role-based Access Control) Model, is a very important method to prevent non-authority visit to prevent network crimes and ensure network safety. Restriction is a group compelling regulations in RBAC, and currently the studies of it focus on relation restriction, precondition restriction, data restriction, responsibility-separated restriction, strength restriction and time restriction, etc. To carry out studies on principles of restriction and to imply them in network system is one of the effective methods to prevent network crimes on administrative level.
作者 许发见
出处 《福建公安高等专科学校学报(社会公共安全研究)》 2006年第2期28-31,共4页 The Study of Social Public Security
关键词 RBAC 约束 网络安全 网络犯罪 RBAC (Role-based Access Control) restriction security of network network crime
  • 相关文献

参考文献2

二级参考文献19

  • 1[美]GradyBooth JamesRumbaugh IvarJacobson.UML用户指南[M].北京:机械工业出版社,2001.. 被引量:1
  • 2OMG Web site.Unified Modeling Language Notation Guide[M].Version 1.3,2000. 被引量:1
  • 3Sandhu R,Bhamidipati V.The ARBAC97 Model for Role based Administration of Role :Preliminary Description and Outline[C].In:Proceedings of the 2th ACM Workshop on Role--Based Access Control, ACM. 1997. 被引量:1
  • 4Ravi Sandhu.Rational for the RBAC96 Family of Access Control Models[C].In:Proceedings of 1st ACM Workshop on Role-based Access control, ACM, 1997. 被引量:1
  • 5Sandhu R,Coyne E J.Role-Based Access Control Models[J].IEEE Computer, 1996;29(2) :38---47. 被引量:1
  • 6Gail-Joon Ahn,Ravi Sandhu.Role-based Authorization Constraints Specification[J].ACM Transactions on Information and Systems Security, 2000;3(4). 被引量:1
  • 7Chen F,Sandhu R.Constraints for role based access control[C].In: Proceedings of the 1st ACM Workshop on Role-Based Access Control, Gaithersburg, MD, 1995 : 39-46. 被引量:1
  • 8Pete Epstein,Ravi S Sandhu.Towards a UML Based Approach to Role Engineering[C].In:ACM Workshop on Role-Based Access Control, 1999 : 135-143. 被引量:1
  • 94.Michael E Shin,Gail-Joon Ahn.UML-based Representation of Role-based Access Control[C].In:Proceedings of 5th IEEE International Workshop on Enterprise Security,NIST,MD,2000. 被引量:1
  • 10Object Constraint Language Specification[S].A web version is in:http: //www.software.ibm.com/ad/ocl ,v.1.1,Rational software Corp, 1997. 被引量:1

共引文献77

同被引文献3

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部