自动化技术、计算机技术 |
|
|
|
|
基于推理的上下文感知RBAC模型设计和实现 |
江颉1,2,张杰2,陈德人1 |
(1.浙江大学 计算机科学与技术学院,浙江 杭州 310027; 2.浙江工业大学 软件学院,浙江 杭州 310014) |
|
Design and implementation of context-aware RBAC model based on reasoning |
JIANG Jie1, 2, ZHANG Jie2, CHEN De-ren1 |
(1.College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China;
2. College of Software, Zhejiang University of Technology, Hangzhou 310014, China) |
[1]SANDHU R S,COYNE E J,FEINSTEIN H L, et al. Rolebased access control models[J].IEEE Computer,1996,29(2):3847.
[2] FERRAIOLO D, SANDHU R, GAVRILA S, et al. Proposed NIST standard for rolebased access control [J].ACM Transactions on Information and System Security,2001, 4(3):224274.
[3] WAINER J, KUMAR A, BARTHELMESS P. DWRBAC: a formal security model of delegation and revocation in workflow systems[J]. Information Systems, 2007,32(3):365384.
[4] BACON J, YAO W, MOODY K. A model of oasis rolebased access control and its support for active security [J].ACM Transactions on Information and System Security, 2002, 5(4):492540.
[5] SANDHU R S, PARK J S, AHN G J. Rolebased access control on the Web [J]. ACM Transactions on Information and Systems Security, 2001, 4(1):3771.
[6]NEUMANN G, STREMBECK M A. Scenariodriven role engineering process for functional RBAC roles[C]∥Proceedings of 7th ACM Symposium on Access Control Models and Technologies. Monterey: ACM, 2002:3342.
[7]STREMBECK M, NEUMANN G. An integrated approach to engineer and enforce context constraints in RBAC environments [J].ACM Transactions on Information and System Security, 2004, 7(3):392427.
[8]ZHANG G, PARASHAR M. Dynamic contextaware access control for grid applications[C]∥ Proceedings of 4th International Workshop on Grid Computing. Phoenix:IEEE,2003:101108.
[9]ZHANG L H, AHN G J, CHU B T. A rulebased framework for rolebased delegation and revocation [J].ACM Transactions on Information and System Security, 2003, 6(3):404441.
[10]ALKAHTANI M A, SANDHU R. Rulebased RBAC with negative authorization[C] ∥20th Annual Computer Security Applications Conference. Tucson, Arizona: IEEE, 2004:405415.
[11]BERTINO E, CATANIA B, FERRARI E, et al. A logical framework for reasoning about access control models [J]. ACM Transactions on Information and System Security, 2003, 6(1):71127.
[12]CRAMPTON J. Constraints: specifying and enforcing constraints in rolebased access control[C]∥Proceedings of the 8th ACM Symposium on Access Control Models and Technologies. Como: ACM, 2003:4350.
[13]CALVANESE D, GIACOMO G D, LENZERINI M. Representing and reasoning on XML documents: a description logic approach [J].Journal of Logic and Computation, 1999, 9(3):295318.
[14]COLMERAUER A. An introduction to Prolog III [J]. Communications of the ACM, 1990, 33(7): 6990.
[15] HEILILI N, CHEN Y, ZHAO C, et al. An OWLbased approach for RBAC with negative authorization [C]∥ Knowledge Science, Engineering and Management. Guilin, China: Springer, 2006:164175. |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|