New model for token role-based access control on enterprise portal
-
摘要: 企业门户中用户和访问权限管理的研究是一项复杂且具挑战性的工作.传统的基于角色的访问控制模型(RBAC,Role-Based Access Control)在实现上通常受单一系统和应用的约束,因此提出了一种基于令牌的角色访问控制模型(TRBAC,Token Role-Based Access Control).该模型采用门户平台下的单点登录(SSO,Single Sign On)技术,将RBAC模型与令牌访问机制相结合,使角色能跨越门户平台下所有的Web应用.该模型是一个动态激活的模型,根据用户实际的访问需求动态激活相应角色,为用户管理和访问控制管理提供了一个新的解决方案.TRBAC模型具有统一的用户安全管理标准,支持集中审核和控制.实践表明,采用TRBAC 模型提高了系统的访问效率,保证了系统的安全性.Abstract: Manage users and access rights are a complex and challengeable job in enterprise portal. Importing the role concept may simplify the access control, but its implementation is usually constrained by the single system and application. A new model,TRBAC(token role-based access control), was proposed for RBAC(role-based access control)on enterprise portal, which integrated the SSO(single sign on) technology and combined the RBAC model with token access mechanism. The role could span all web systems in portal. It was a token-based and dynamic-activated access control model, which could dynamically adjust the access rights according to user access requirement. It solved the problems on user management and access control management, and supported the corporate security standards, central auditing and control. The practice indicates that TRBAC improves the system efficiency and ensures the security.
-
Key words:
- enterprise portal /
- access control model /
- role-based access control /
- token
-
[1] 徐家俊,贾文玉.企业信息门户EIP[M].北京:机械工业出版社,2004 Xu Jiajun,Jia Wenyu.Enterprise information portal[M].Beijing:China Machine Press,2004(in Chinese) [2] Ferraiolo David,Kuhn Richard.Role-based access controls Proceedings of the 15th NIST-NCSC National Computer Security Conference. Baltimore:NIST-NCSC,1992:554-563 [3] Ferraiolo David,Barkley John,Kuhn Richard.A role-based access control model and reference implementation within a corporate intranet[J]. ACM Transaction on Information and System Security,1999,2(1):34-64 [4] 许峰,赖海光,黄皓,等.面向服务的角色访问控制技术研究[J].计算机学报,2005,28(4):686-693 Xu Feng,Lai Haiguang,Huang Hao,et al.Service-oriented role-based access control[J].Chinese Journal of Computers,2005,28(4):686-693(in Chinese) [5] Saltzer J H,Schroeder M D.The protection of information in computer systems[J].Proceedings of the IEEE,1975,63(9):1278-1308 [6] Wood C,Fernandez E B.Authorization in a decentralized database system Proceedings of the 5th International Conference on Very Large Databases.Brazil:IEEE Computer Society, 1979:352-359
点击查看大图
计量
- 文章访问数: 2729
- HTML全文浏览量: 177
- PDF下载量: 1270
- 被引次数: 0