基于角色的CSCW系统访问控制模型
作者:
基金项目:

本文研究得到国家863高科技项目基金(No.863-306-ZT02-03-01)资助.

  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [9]
  • |
  • 相似文献 [20]
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    针对现有的方法不能很好地满足CSCW系统对访问控制提出的新的需求,该文提出了一个基于角色的CSCW系统访问控制模型RBCSAC(role-based collaborative systems access control).该模型形式化地描述了数据、操作、权限、角色和用户等要素及其相互间的关系,提供访问控制信息的记录方法,通过分配和取消角色来完成对用户权限的授予和取消,并且提供了角色分配规则和操作合法性检查规则.该模型针对CSCW系统的多用户、交互、协作、实时、动态等特性,能较好地满足CSCW系统对访问控制的需求.

    Abstract:

    CSCW systems introduce new requirements for access control, which cannot be met by using existing models. In this paper, a new role-based access control model, RBCSAC (role-based collaborative systems access control), is introduced to meet these requirements. This model formally describes the relationship between the key elements of access control such as data, operation, privilege, role and user. It provides the method for recording access control information. The model grants and revokes access privileges of cooperative users by assigning them some roles and canceling their roles. Two role-assignment rules are also provided and two operation legality checking rules. RBCSAC model is brought forward aiming at accommodating with the characteristics of collaborative systems such as multi-user, interaction, collaboration, real-time, dynamic. This model can meet the requirements for access control in CSCW systems adequately.

    参考文献
    [1]Ellis C A, Gibbs S J, Rein G L. Groupware: some issues and experiences. Communications of the ACM, 1991,34(1):39~58
    [2]Mao Bing, Xie Li. An object-based computing model for CSCW systems. China Science (Series E), 1997,27(6):542~547 (茅兵,谢立.基于对象的协同计算模型.中国科学(E辑),1997,27(6):542~547)
    [3]Shen Hong-hai, Dewan P. Access control for collaborative environments. In: Turner J, Kraut R eds. Proceedings of the ACM CSCW'92 Conference on Computer Supported Cooperative Work. New York: ACM Press, 1994. 51~58
    [4]Lampson B W. Protection. ACM Operating System Review, 1974,8(1):18~24
    [5]Graham G S, Denning P J. Protection-Principles and practice. In: Denning P J ed. Proceedings of the Spring Joint Computer Conference. Montvale, NJ: American Federation of Information Processing Societies Press, 1972. 417~429
    [6]Sandhu R S, Coyne E J, Feinstein H L et al. Role-Based access control models. IEEE Computer, 1996,29(2):38~47
    [7]Zahir T, Shun W C. A role-based access control for Intranet security. IEEE Internet Computing, 1997,1(5):24~34
    [8]Smith R B, Hixon R, Horan B. Supporting flexible roles in a shared space. In: Poltrock S, Grudin J eds. Proceedings of the ACM CSCW'98 Conference on Computer Supported Cooperative Work. New York: ACM Press, 1998. 197~206
    [9]Ferraiolo D F, Gilbert D M, Lynch N. An examination of federal and commercial access control policy needs. In: Proceedings of the 16th NIST-NCSC National Computer Security Conference. Gaithersburg, Maryland: National Institute of Standards and Technology, 1993. 107~116
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

李成锴,詹永照,茅兵,谢立.基于角色的CSCW系统访问控制模型.软件学报,2000,11(7):931-937

复制
分享
文章指标
  • 点击次数:3884
  • 下载次数: 5332
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:1999-01-19
  • 最后修改日期:1999-07-12
文章二维码
您是第19939276位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号