期刊文献+

分布式环境下的一种基于角色的访问控制模型 被引量:5

A role base-access control model in distributed environment
下载PDF
导出
摘要 为将角色访问控制RBAC应用于分布式环境,本文研究了传统RBAC角色组织结构,在倒转树型角色组织结构的基础上引入域的概念,将分布式系统中各机构封装成域.进而针对分布式系统的特殊性提出原始域和构造域概念,扩展了权限的概念,然后分别提出了域内和域间的访问控制策略.从而实现了RBAC的分散化和分布式管理. In order to apply the role-based access control into distributed environment, this article did a lot of research on the role architecture of the traditional RBAC, introduced the concept of domain on the basis of the inverted tree architecture, encapsulated each part of the distributed system into domains, and put forward the concepts of origin-domain and constructed-domain according to the particularity of the distributed system, expended the concept of Permission at the same time, then bring forward two different policies separately for the access control in one domain and inter-domains access control, consequently, realized the disperse and distributed organization of RBAC.
出处 《四川大学学报(自然科学版)》 CAS CSCD 北大核心 2007年第2期303-306,共4页 Journal of Sichuan University(Natural Science Edition)
关键词 基于角色的访问控制 分布式信息系统 原始域 构造域 role-based access control, distributed irrformation system, origin-domain, constructed-domain
  • 相关文献

参考文献5

二级参考文献11

  • 1Venkata B, Ravi S. Push architectures for user role assigrmaent. In: James Cannady, Ravi Sandhu, eds. 23rd National Information Systems Security Conference. Baltimore, 2000. California: National Institute of Standards and Technology, National Computer Security Center,1998. 89-101. 被引量:1
  • 2Ravi S, Bhamidipati. Role-based administration of userrole assignment: the URA97 model and its oracle implementation. Journal of Computer Security, 1999, 7(4) :317-342. 被引量:1
  • 3Sandhu R S,Samarati P.Authentication,Access Control,and Intrusion Detection.In:ACM Computing Surveys,50th Anniversary Comme-morative Issue,1996,28(1) 被引量:1
  • 4Object Management Group.CSI:Common Secure Interoperability.Technical Report,1996 被引量:1
  • 5Object Management Group.CORBA 2.3.1/IIOP Specification.Techni-cal Reprot ,1999 被引量:1
  • 6Sondhu R S, Coyne Ei, FeiMtein H L, Youman C E. Role-Based Access control Models. IEEE Computer, 1996,29 ( 2 ) : 38-47. 被引量:1
  • 7Hfisto Koshutanski, Fabio Massacci. An Access Control Framework for Business Processes for Web Services. ACM Workshop on XML Securfly, October 31, 2003:1S -24. 被引量:1
  • 8刘琼波,施军,尤晋元.分布式环境下的访问控制[J].计算机研究与发展,2001,38(6):735-740. 被引量:18
  • 9聂伯敏,熊桂喜.分布式环境下基于角色访问控制的实现[J].计算机工程,2002,28(8):181-183. 被引量:19
  • 10吕宜洪,宋瀚涛,龚元明.基于RBAC改进模型的角色权限及层次关系分析[J].北京理工大学学报,2002,22(5):611-614. 被引量:18

共引文献16

同被引文献42

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部