期刊文献+

基于规则引擎的访问控制研究 被引量:3

Research on Access Control based on Rule Engine
下载PDF
导出
摘要 针对基于角色的访问控制模型RBAC没有将上下文考虑在内,而且控制力度只能到达商务方法级,提出了一种基于规则引擎的访问控制模型。该模型不仅继承了RBAC的优点,同时还利用规则实现了细粒度的访问控制,使开发人员能够动态地控制应用程序的行为。 According to Role-Based Access Control(RBAC) dose not take into account the context,and control efforts can only reach the business method level,Proposed a access control based on rule engine.The model not only inherits the advantages of RBAC,but also use the rules to achieve the fine-grained access control,enabling developers to dynamically control the behavior of the application.
作者 王辉
出处 《计算机安全》 2011年第6期37-39,共3页 Network & Computer Security
关键词 规则引擎 访问控制 角色 DROOLS Rule Engine Access Control Role Drools
  • 相关文献

参考文献5

二级参考文献31

  • 1袁平鹏,陈刚,董金祥.多政策的两层协同应用存取控制模型[J].计算机辅助设计与图形学学报,2004,16(4):420-426. 被引量:19
  • 2SANDHU RS,COYNE EJ,FEINSTEIN HL,et al.Role-based access control models[J]. IEEE Computer,1996,29(2):38-47. 被引量:1
  • 3MCPHERSON D,Microsoft Corporation.Role-Based Access Control for Multi-tier Applications Using Authorization Manager[EB/OL].http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/management/athmanwp.mspx,2004-07. 被引量:1
  • 4L Snyder. Formal Models of Capability-based Protection Systems[ J].IEEE Transactions on Computers, 1981,30(3 ) :172-181. 被引量:1
  • 5R Sandhu, E Coyne, H Feinstein. Role-based Access Control Models[ J]. IEEE Computer, 1996,29 (6) :38-47. 被引量:1
  • 6D Ferraiolo, R Sandhu,et al. Proposed NIST Standard for Role-based Access Control [ J ]. ACM Transactions on Information and System Security(TISSEC) ,2001,4(3) :224-274. 被引量:1
  • 7R Thomas, R Sandhu. Task-Based Authorization Controls(TBAC) : A Family of Models for Active and Enterprise-Oriented Authorization Management[ C]. Lake Tahoe, CA: Proceedings of the 11th IFIP WG11.3 Conference on Database Security, 1997. 被引量:1
  • 8Gail-Joon Ahn, Myong Kang,et al. Injecting RBAC to Secure a Webbased Workflow System[ C]. ACM RBAC, 2000. 被引量:1
  • 9Sejong Oh, Seog Park. Task-role-based Access Control Model[ J ]. Information System, 2003, 28 : 533-562. 被引量:1
  • 10J Park, R Sandhu. Towards Usage Control Models: Beyond Traditional Access Control[ C]. Proceedings of the 7th ACM Symposium on Access Control Models and Technologies,2002. 被引量:1

共引文献109

同被引文献36

  • 1袁磊.使用控制模型的研究[J].计算机工程,2005,31(12):146-148. 被引量:12
  • 2刘伟.Java规则引擎——Drools的介绍及应用[J].微计算机应用,2005,26(6):717-721. 被引量:37
  • 3王保义,王蓝婧.电力信息系统中基于属性的访问控制模型的设计[J].电力系统自动化,2007,31(7):81-84. 被引量:12
  • 4Park J, Sandhu R. Towards traditional access control [C] usage control models: Beyond //Proceedings of the 7th ACM Symposium on Access Control Models and Technologies. New York: ACM, 2002: 57-64. 被引量:1
  • 5Zhang X W, Park J, Sandhu R, et al. A logical specification for usage control [C] //Proceedings of the 9th ACM Symposi- um on Access Control Models and Technologies. New York: ACM, 2004: 1-10. 被引量:1
  • 6Salim F, Reid J, Dawson E. An administrative model for UCONABc [C] //Proceedings of the 8th Australasian Confe- rence on Information Security. Darlinghurst: Australian Com- puter Society, 2010: 32-38. 被引量:1
  • 7Zhang X W, Sandhu R, Presicce F P. Safety analysis of usage control authorization models [C] //Proceedings of the ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2006: 243-254. 被引量:1
  • 8Rajkumar P V, Ghosh S K, Dasgupta P. An end to end correct- ness verification approach for application specific usage control [C] //Proceedings of the International Conference on Industrial and Information Systens Washington: IEEE, 2009: 1-6. 被引量:1
  • 9Fang Zhihe, He Hongiun, Luo Li, et al. Application of UCON in SSL VPN system [C] //Proceedings of the Intema tional Conference on Progress in lnformatics and Computing. Washington: IEEE, 2010: 618-621. 被引量:1
  • 10Liu Chen, Dong Xupeng: Yang Zhengqiu. Research of modem enterprise intelligent system based on rule engine and workflow [C] //Proceedings of the International Conference on Intelli- gent Computing and Intelligent Systems. Washington: IEEE, 2010: 594-597. 被引量:1

引证文献3

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部