期刊文献+

基于角色的访问控制在公钥密码系统中的实现

Realization of the access control based on the attribute in public key system
下载PDF
导出
摘要 本文讨论了基于角色的访问控制的基本原理,在基本PMI模型的基础上,建立了基于角色的特权模型。在此基础上,建立一个在公钥密码系统下的企业级RBAC模型。该系统结构清晰,实现简单,不需要对被保护的应用服务器做任何的修改,极大地简化了企业网络服务中的权限管理,并能够保证企业安全策略的贯彻和实施。 The principle of RBAC is discussed. Based on the basic PMI model, the privilege model based on attribute is established. Then, the RBAC model in public key system is established. The model has a clear structure and can be realized easily without any modification on the secured application server. Therefore, the privilege management in net service can be simplified while the security strategy of enterprise can be implemented.
作者 商伶俐
出处 《农业网络信息》 2007年第5期63-65,共3页 Agriculture Network Information
关键词 访问控制 公钥密码 角色 Access control Public key Attribute
  • 相关文献

参考文献2

二级参考文献10

  • 1[1]ITU-T Recommendation X.509.Information Technology-Open System Interconnection- The Directory:Public Key and Attribute Certificate Framework.2000 被引量:1
  • 2[2]Oppliger R,Permul G,Strauss C.Using Attribute Certificates to Imple-ment Role-based Authorization and Access Controls.http:∥www.entrust, com 被引量:1
  • 3[3]Entrust XML Strategy for Authorization. http:∥www.entrust.com 被引量:1
  • 4[4]ISO 1018 1-3.1nformation Technology - Open Systems Interconnection Security frameworks for Open System:Access Control Framework. 被引量:1
  • 5[5]Boeyen S.X.509 (2000):4th Edition:Overview of PKI & PMI Frame-works.http:∥www.entrust.com 被引量:1
  • 61,Ferraiolo D F, Kuhn R. Role-Based access control. In: Proceedings of the 15th National Computer Security Conference. Baltimore, MD, 1992. 554~563, http://hissa.ncsl.nist.gov/kuhn/ 被引量:1
  • 72,Sandhu R, Samarati P. Access control: principles and practice. IEEE Communications, 1994,32(9):40~48 被引量:1
  • 83,Ramaswamy C, Sandhu R. Role-Based access control features in commercial database management systems. In: Proceedings of the 21st National Information Systems Security Conference. Virginia: U.S. Government Printing Office, 1998, http://www.list.gmu.edu/conferen.htm 被引量:1
  • 94,Sandhu R, Coyne E J, Feinstein H L et al. Role-Based access control models. IEEE Computers, 1996,29(2):38~47 被引量:1
  • 105 Sandhu R. Rationale for the RBAC96 family of access control models. In: Proceedings of the 1st ACM Workshop on Role-Based Access Control. ACM, 1997. http://www.list.gmu.edu/conferen.htm 被引量:1

共引文献113

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部