Citation: | Cao Yonggang, Jin Maozhong, Liu Chaoet al. Modified RBAC model and its application on content management system[J]. Journal of Beijing University of Aeronautics and Astronautics, 2005, 31(10): 1153-1158. (in Chinese) |
[1] 徐国定,罗雪平,郑奕莉. 寄予级别的信息管理系统授权模型[J] 华东师范大学学报(自然科学版), 2000, 12(4):37~43 Xu Guoding, Luo Xueping, Zheng Yili. A rank based model of authorization for information systems[J] Journal of East China Normal University (Natural Science), 2000,12(4):37~43(in Chinese) [2] Sandhu R S, Samarati P. Access control:principle and practice [J] Communications Magazine, IEEE, 1994,32(9):40~48 [3] Sandhu R S, Coyne E J, Feinstein H L, et al. Role-based access control models [J] EEE Computer, 1996, 29(2):38~47 [4] Osborn S, Sandhu R, Munawer Q. Configuring role-based access control to enforce mandatory and discretionary access control policies[J] ACM Transactions on Information and System Security, 2000, 3(2):85~106 [5] Steinmuller B, Safarik J. Extending role-based access control model with states . Proc. of the International Conference on Trends in Communications . Bratislava:INSPEC, 2001, 2:398~399 [6] Gavrila S, Barkley J. Formal specification for role based access control user/Role and role/role relationship management . Proc. of the Third ACM Workshop on Role-Based Access Control . Virginia:ACM Press, 1998.81~90 [7] 梁 彬, 孙玉芳, 石文昌,等. 一种改进的以基于角色的访问控制实施BLP模型及其变种的方法[J] 计算机学报, 2004, 27(5):636~644 Liang Bin, Sun Yufang, Shi Wenchang, et al. An improved method to enforce BLP model and its variations in role based access control[J] Chinese Journal of Computers, 2004, 27(5):636~644(in Chinese) [8] Ferraiolo D F, Cugini J, Kuhn D R. Role based access control:features and motivations . Proc. of 11th Annual Conference on Computer Security Applications . Los Alamitos:IEEE Computer Society Press, 1995. 241~248 [9] Joshi J B D, Bertino E, Ghafoor A. Hybrid role hierarchy for generalized temporal role based access control model . In:Proc. of 26th Annual International Computer Software and Applications Conference . Oxford:IEEE Computer Society Press, 2002. 951~956 [10] 刘宏月,范九伦,马建峰.访问控制技术研究进展[J] 型微型计算机系统, 2004, 25(1):56~59 Liu Hongyue, Fan Jiulun, Ma Jianfeng. Research advances on access control[J] Mini-Micro Systems Jan, 2004, 25(1):56~59(in Chinese) [11] 查义国, 徐小岩, 张毓森. 在Web上实现基于角色的访问控制[J] 计算机研究与发展, 2002,39(3):257~263 Zha Yiguo, Xu Xiaoyan, Zhang Yusen. Implementing RBAC on the Web[J] Journal Of Computer Research And Development, 2002, 39(3):257~263(in Chinese)
|