期刊文献+

U型组织中信息系统扩展访问控制模型的研究 被引量:2

Research of Extend Access-Control Model of Information System in United Organization
原文传递
导出
摘要 在基于角色访问控制模型的基础上,针对U型组织结构中信息系统的特点,提出一个扩展角色访问控制模型,新模型引入信息域和操作域的概念,对角色和权限进行扩展和形式化定义,使扩展RBAC模型对于信息系统的权限分配直观、容易理解、便于使用,能够灵活、高效地对系统进行权限访问控制,并采用客户端自主访问控制和服务器端审核的方式,增强访问控制安全。 Based on the role-based access control model, focuses on the traits of information system in united organization structure, this paper proposes an extended roles access control model. The new model applys the concept of information-domain and operation-do-main, and extends and formalized defines the roles and access control, so as to make the system assign permission more intuitionistic, understandable and easier to use. Meanwhile, the new model controls the permission access freely and efficiently, and enhances the security of access control by using the client discretionary access control and server authorization.
出处 《图书情报工作》 CSSCI 北大核心 2009年第24期46-50,共5页 Library and Information Service
基金 国家863项目"基于国产软硬件的多通道网络教育关键技术与应用研究"(项目编号:2003AA116060) 四川省科技厅项目"基于Linux-NC的网络教育关键技术的研究与开发"(项目编号:05GG007-006)研究成果之一
关键词 信息域 操作域 角色 授权 访问控制 information-domain operation-domain role authorization access control
  • 相关文献

参考文献10

  • 1Harrison M H, Ruzzo W L, Ullman J D. Protection in operating systems. Communications of the ACM, 1976,19 ( 8 ) :461 - 471. 被引量:1
  • 2Osbom S, Sandhu R, Munawer Q. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, 2000, 3(2) :85 -106. 被引量:1
  • 3David E, Ferraiolo D, Richard K. Role-based access controls// Proceedings of 15^th NIST-NCSC National Computer Security Conference. Baltinore: NIST-NCSC, 1992 : 554 - 563. 被引量:1
  • 4Thomas R K, Sandhu R S. Conceptual foundations for a model of task-based authorizations//Proceedings of the 7th Computer Security Foundations Workshop. Franconia, IEEE, New Hampshine, 1994 : 66 - 79. 被引量:1
  • 5Thomas R K, Sandhu R S. Task-based authentication controls ( TABC ) : A family of models for active and enterprise-oriented authentication management//Proceedings of 11^th IFIP Working Conference on Database Security. Lake Tahoe : IFIP, 1997 : 166 - 181. 被引量:1
  • 6Sandhu R, Ferraiolo D, Kuhn R. The NIST model for role-based access control: Towards a unified standard//Proceedings of 5th ACM Workshop on Role-based Access Control. Berlin: NIST RBAC, 2000,7:47 - 63. 被引量:1
  • 7Ferraiolo D F, Sandhu R, Gavrila S, et al. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security. 2001,4 ( 3 ) :224 - 274. 被引量:1
  • 8蒋春芳..信息作战环境下信息系统安全体系结构若干问题研究[D].华中科技大学,2005:
  • 9韩毅,张克菊,金碧辉.竞争情报的开放存取模型与角色控制机制[J].图书情报工作,2009,53(6):66-69. 被引量:3
  • 10樊振佳.政府在公共信息资源管理中的角色定位[J].图书情报工作,2007,51(4):45-47. 被引量:7

二级参考文献13

共引文献7

同被引文献12

引证文献2

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部