Volume 29 Issue 6
Jun.  2003
Turn off MathJax
Article Contents
Li Jian, Tang Wenzhong, Song Changfuet al. Application of RoleBased Access Control in Management Information System[J]. Journal of Beijing University of Aeronautics and Astronautics, 2003, 29(6): 534-538. (in Chinese)
Citation: Li Jian, Tang Wenzhong, Song Changfuet al. Application of RoleBased Access Control in Management Information System[J]. Journal of Beijing University of Aeronautics and Astronautics, 2003, 29(6): 534-538. (in Chinese)

Application of RoleBased Access Control in Management Information System

  • Received Date: 09 Apr 2002
  • Publish Date: 30 Jun 2003
  • Role based access control was being paid more and more attention as a security mechanism. Traditional access control policies, including discretionary access control (DAC) as well as mandatory access control (MAC), were first briefly introduced. An access control model based on RBAC2 was provided, which not only inherited the advantage of RBAC2, but also extended the ability of modifying individual permissions. An example application of the model is presented as a proof of its availability. The distributed management for permissions was discussed.

     

  • loading
  • [1] 谭伟贤,杨力平. 计算机网络安全教程[M]. 北京:国防工业出版社,2001.61~64 Tan Weiqiang,Yang Liping. Computer network security tutorial[M]. Beijing:National Defence Industry Press,2001.61~64(in Chinese) [2] 马林胜. 数据库应用系统用户权限适应性研究及其在管理信息系统中的实现. 北京:北京航空航天大学机械工程及自动化学院,2002 Ma Linsheng. Research of adaptability of user popedom in database-based application system and it's realization in manage information system. Beijing:School of Mechanical Engineering and Automation,Beijing University of Aeronautics and Astronautics, 2002(in Chinese) [3] 刘启原,刘 怡. 数据库与信息系统的安全[M].北京:科学出版社,2000.63~66 Liu Qiyuan,Liu Yi. Database and information system security[M]. Beijing:Science Press,2000.63~66(in Chinese) [4] 李孟珂,余祥宣. 基于角色的访问控制技术及应用[J]. 计算机应用研究,2000,(10):44~47 Li Menke,Yu Xiangxuan. Technology of role-based access control and it's application[J].Computer Application Research,2000,(10):44~47(in Chinese) [5] 曹天杰,张永平. 管理信息系统中基于角色的访问控制[J]. 计算机应用,2001,21(8):21~23 Cao Tianjie,Zhang Yongping. Role-based access control in management information system [J]. Computer Applications,2001,21(8):21~23(in Chinese) [6] Kim K H. Boolean matrim theory and applications[M]. USD:Dekker, Marcel Incorporated,1982 [7] Sanhu R S,Coyne E J,Feinstein H L,et al. Role-base access models. EIII Computer,1996,29(2) [8] Ahn G J,Arvisandhu. Role-based authorization constraints specification[J]. ACM Transcations on Information and System Security, 2002,3:207~226
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(2699) PDF downloads(9) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return