计算机科学 ›› 2013, Vol. 40 ›› Issue (10): 155-158.

• 软件与数据库技术 • 上一篇    下一篇

基于时间分区的改进RBAC授权模型

王晓琳,史有群,唐成,徐康   

  1. 东华大学计算机科学与技术学院 上海201620;东华大学计算机科学与技术学院 上海201620;东华大学计算机科学与技术学院 上海201620;东华大学计算机科学与技术学院 上海201620
  • 出版日期:2018-11-16 发布日期:2018-11-16

Improved RBAC Authorization Model Based on Time Partition

WANG Xiao-lin,SHI You-qun,TANG Cheng and XU Kang   

  • Online:2018-11-16 Published:2018-11-16

摘要: 针对传统RBAC授权模型灵活性低的问题,提出了一种基于时间分区的改进RBAC授权模型。首先将系统的整体进程分成若干时间分区,分别在每个分区里分配角色和权限,使得各个分区独立且紧密相连。其次,将时间分区具体化为阶段集,并在基本RBAC模型中引入阶段集使其构成改进RBAC模型。管理员只需要控制阶段的进度就可以控制各角色、各用户的访问权限。该改进模型在公选系统的实际应用中取得了很好的效果。

关键词: RBAC,访问控制,时间分区,阶段

Abstract: The traditional RBAC model has less flexibility to assign permissions of users.This paper proposed an improved RBAC authorization model based on time partition.The whole system process is divided into several time partitions.The permissions associated with each role are distributed in each independent partition.The set of stages which have the permissions of each time partition constructs the improved RBAC model by combining the basic RBAC model.When the stages are determined,the permissions of roles and users can be configured by the administrator.The proposed RBAC model is applied in public selecting system stably and obtains good performance.

Key words: RBAC,Access control,Time partition,Stage

[1] Xing Tian-yang,Cao Min.Research and application of algorithm for generating authority-tree based on TP-RBAC model[J].Computer Engineering and Design,2010,1(5):950-953
[2] 钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,1(6):779-784
[3] 信科,杨峰,杨光旭,等.基于RBAC权限管理系统的优化设计与实现[J].计算机技术与发展,2011,1(7):172-174
[4] Sandhu R,Coyne E J,Feinstein H,et al.Role-based access control models [J].IEEE Computer,1996,9(2):38-47
[5] Zhou Wei,Meinel C.Team and task based RBAC access control model[C]∥Network Operations and Management Symposium,2007,LANOMS 2007.Latin American,IEEE,2007:84-94
[6] Ferraiolo D,Kuhn R.Role-Based Access Controls[C]∥Procee-dings of the 15th NIST-NCSC National Computer Security Conference.1992:554-563
[7] Yu Su,Wang Yin,Hua Kun.The research of information security based on RBAC with SOD [J].International Journal of Advancements in Computing Technology,2012,4(14):482-490
[8] 杨彩侠,王小慧,曹旻.OF_RBAC权限控制模型的研究及应用[C]∥Proceedings of 2010International Conference on Management Science and Engineering.2010:65-69
[9] 董理君,胜生,杜敏,等.一种基于环境安全的角色访问控制模型研究[J].计算机科学,2009,6(1):1-54

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!