期刊文献+

基于时态信息的RBAC建模研究

A Survey of Aeneral Temporal RBAC Studying
下载PDF
导出
摘要 经过多年的发展,RBAC模型理论研究已十分成熟,并广泛成功应用于信息系统访问控制。本文阐述了RBAC模型安全控制的思想及原理,它通过抽象用户、角色、目标、操作、许可权5个基本数据元素并建立它们之间的联系构建网络状的权限控制模型;分析了RBAC模型在处理具有时间约束的访问控制时的不足,不能充分考虑时态系统中基于时间约束的授权和访问控制;回顾了时态RBAC模型的研究现状,讨论了时态RBAC模型在时态系统授权中存在的问题,它只在角色层次进行了简单约束,而对授权和角色指派等过程中的细节考虑不够;展望了GTRBAC模型的思想并进行了讨论,GTRBAC不仅在时态RBAC的基础上考虑了持续约束、周期约束和其他特定形式的激活约束,而且提出了约束冲突的解决办法,是目前在时态环境下定义比较完全和细致的访问控制模型。 After the development of so many years, RBAC has cumulated abundant and mature theory basis and is widely used in access control in information system. In this paper, the access control thinking and principle of RBAC model are illustrated first. It consructs network security control model by abstracting five basic data objects which are user, role, object, operation and permission respectively in building the relationship among them. Then the disadvantages of RBAC in processing time-constraint access control are analysed. Secondly, we retrospect the studying status quo of temporal RBAC model and analyse the existing problem of TRBAC during authorizing in temporal system. It constraints the permission only in role level and does not consider fully the details during authorizing and role assignmeng. Finally,a model named GTRBAC and its thinking are prospected. GTRBAC is a well defined access control model in temporal environment by now. It not only considers persistent constraints, circular contraints and other particular activate contraints on the basis of RBAC, but also proposes the methods solving conflicts amongs contraints.
作者 刘智 邹枝玲
出处 《重庆师范大学学报(自然科学版)》 CAS 2009年第3期69-71,共3页 Journal of Chongqing Normal University:Natural Science
基金 重庆市自然科学基金计划项目(No.CSTC 2008BB0260)
关键词 时态系统 基于角色的存取控制 时态约束 访问控制 temporal system RBAC temporal contraint access control
  • 相关文献

参考文献9

二级参考文献37

  • 1沈群,雷咏梅,蔡红霞.RBAC及XACML在制造网格访问控制中的应用[J].计算机应用研究,2005,22(9):137-139. 被引量:1
  • 2姚寒冰,胡和平,卢正鼎,李瑞轩.基于角色和上下文的动态网格访问控制研究[J].计算机科学,2006,33(1):41-44. 被引量:9
  • 3孙为群,单保华,张程,刘晨.一种基于角色代理的服务网格虚拟组织访问控制模型[J].计算机学报,2006,29(7):1199-1208. 被引量:16
  • 4孙鹏,杨德婷,周维,南凯,阎保平.网格环境下动态访问控制模型的研究与实现[J].计算机工程与应用,2007,43(11):132-134. 被引量:3
  • 5[1]FOSTER I,KESSELMAN C,TUECKE S.The Anatomy of the Grid:Enabling Scalable Virtual Organizations[J].International Journal of High Performance Computing Applications,2001,15(3):200-222. 被引量:1
  • 6[2]FOSTER I,KESSELMAN C,TSUDIK G,et al.A Security Architecture for Computational Grids[C/OL]// Proc.5th ACM Conference on Computer and Communications Security Conference,1998,83-92[2008-03-06].http://www.chinagrid.net/grid/paperppt/GlobusPaper/security.pdf.[3] PEARLMAN L,WELCH V.FOSTER I,et a1.A Community Authorization Service for Group Collaboratio[C/OL]// Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks,2002:50-59[2008-03-06].http://www.chinagrid.net/grid/paperppt/GlobusPaper/CAS_2002_Revised.pdf. 被引量:1
  • 7[4]EREIRA A L,MUPPAVARAPU V,CHUNG S M.Role-based access control for grid database services using the community authorization service[J].Dependable and Secure Computing,IEEE Transactions,2006,3(2):156-166. 被引量:1
  • 8[5]WELCH V,FOSTER I,KESSELMAN C,et al.X.509 Proxy Certificates for Dynamic Delegation[C/OL]// 3rd Annual PKI R&D Workshop,2004[2008-03-06].http://www.chinagrid.net/grid/paperppt/GlobusPaper/pki04-welch-proxy-cert-final.pdf. 被引量:1
  • 9[6]LANG B,FOSTER I,SIEBENLIST F,et al.A Multipolicy Authorization Framework for Grid Security[C/OL]//in proc.NCA,2006,269-272[2008-03-06].http:www.globus.org.2006.A. 被引量:1
  • 10CALVER K L. Architecture Framework for Active Network[DB/OL]. http://www. dcs. uky. edu/~calvert/arch-docs.html,1999-07. 被引量:1

共引文献98

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部