期刊文献+

基于上下文感知的RBAC动态访问控制研究 被引量:4

Research of RBAC Dynamic Access Control Based on Context-aware
下载PDF
导出
摘要 针对传统RBAC(Role Based access control)模型不能适应当前网络和分布式计算应用环境的分布、异构和动态性的特点,为了适应应用环境的动态要求,将上下文感知和上下文约束加入RBAC模型,提出了上下文感知的动态访问控制模型CDAC(Context-aware Dynamic Access Control Model),并给出了该模型的一个应用实例。该模型不仅继承了RBAC的优点,还利用上下文感知和上下文约束,实现了角色和权限的实时的动态管理。 In view of the traditional R, BAC model cannot adapt the current network and the distributed computing application environment' s distribution, isomerism and dynamic characteristics, author added context-aware and context constraints in PBAC, proposed context-aware dynamic access control modei(CDAC) to adapt the application environment dynamic request, and gave an application example of this model. This model does not only inherited the PBAC merit, but also used the context-aware and context constraints,realized real-time dynamic management of the role and permission.
出处 《计算机安全》 2009年第8期5-8,共4页 Network & Computer Security
基金 国家高技术研究发展计划(863计划)(No.2006AA01Z455)
关键词 RBAC 访问控制 上下文感知 授权服务 约束规则 RBAC access control context-aware authorization service constraint rule
  • 相关文献

参考文献2

二级参考文献16

  • 1Snyder L.Formal Models of Capability-Based Protection Systems[J].IEEE Trans on Computers,1981,30(3):172-181. 被引量:1
  • 2Ferraiolo D,Kuhn R.Role-Based Access Control[A].Proc of the 15th NIST-NCSC National Computer Security Conf[C].1992.554-563. 被引量:1
  • 3Sandhu R,Conyne E J,Lfeinstein H,et al.Role Based Access Control Models[J].IEEE Computer,1996,29(2):38-47. 被引量:1
  • 4Foster I,Kesselman C,Tuecke S.The Anatomy of the Grid:Enabling Scalable Virtual Organizations[J].International Journal of Supercomputer Applications,2001,15(3):1-10. 被引量:1
  • 5Weiser M.The Computer for the 21th Century[J].Scientific American,1991,265(3):94-104. 被引量:1
  • 6Mostéfaoui G,Brézillon P.A Generic Framework for Context-Based Distributed Authorizations[A].Proc of the 4th Int'l and Interdisciplinary Conf on Modeling and Using Context[C].2003.204-217. 被引量:1
  • 7McDaniel P.On Context in Authorization Policy[A].Proc of the 8th ACM Symp on Access Control Models and Technologies[C].2003. 被引量:1
  • 8Wooldridge M,Jennings R.Intelligent Agent:Theory and Practice[J].Knowledge Engineering Review,1995,10(2):115-152. 被引量:1
  • 9Kotz D,Gray R S.Mobile Agents and the Future of the Internet[J].ACM SIG Operating Systems Review,1999,33(3):7-13. 被引量:1
  • 10Ferraiolo D F, Barkly J F, Kuhn D R. A Role Based Access Control Model and Reference Implementation Within a Corporate Internet[J]. ACM Transactions on Information Systems Security, 1999, 1(1): 23-31. 被引量:1

共引文献5

同被引文献42

引证文献4

二级引证文献68

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部