• Article
  • | |
  • Metrics
  • |
  • Reference [12]
  • |
  • Related [20]
  • |
  • Cited by
  • | |
  • Comments
    Abstract:

    Systemic security strategy is described by security query in administrative model of role-based access control (RBAC). According to the definition of state-transition system, security analysis is defined and executed on Turing machine. Security query is classified by necessity and possibility. As a result, necessary security query and possible security query independent of status can be resolved in polynomial time, and the conditions under which possible security query is NP-complete problem are presented, but general possible security query is un-decidable.

    Reference
    [1]Sandhu R,Coyne EJ,Feinstein HL,Youman CE.Role-Based access control models.IEEE Computer,1996,29(2):38-47.
    [2]Sandhu R.Rationale for the RBAC96 family of access control models.In:Youman C,Sandhu R,Coyne E,eds.Proc.of the 1st ACM Workshop on Role-Based Access Control.New York:ACM Press,1996.38-47.
    [3]Hong F,He XB,Xu ZY.Role-Based access control.Mini-micro system,2000,21(2):198-200 (in Chinese with English abstract).
    [4]Sandhu R,Bhamidipati V,Munawer Q.The ARBAC97 model for role-based administration of roles.ACM Trans.on Information and Systems Security (TISSEC),1999,2(1):105-135.
    [5]Oh S,Sandhu R.A model for role administration using organization structure.In:Sandhu R,Bertino E,eds.Proc.of the 6th ACM Symp.on Access Control Models and Technologies (SACMAT 2002).Monterey:ACM Press,2002.155-162.
    [6]Crampton J,Loizou G.Administrative scope:A foundation for role-based administrative models.ACM Trans.on Information and System Security (TISSEC),2003,6(2):201-231.
    [7]Harrison MA,Ruzzo WL,Ullman JD.Protection in operation systems.Communications of the ACM,1976,19(8):461-471.
    [8]Li NH,Tripunitara MV.Security analysis in role-based access control.In:Proc.of the 9th ACM Symp.on Access Control Models and Technologies (SACMAT 2004).2004.126-135.
    [9]Li NH,Winsborough WH,Mitchell JC.Beyond proof-of-compliance:Safety and availability analysis in trust management.In:Proc.of the IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,2003.123-139.
    [10]Sipser M; Zhang LA,Wang HP,Huang X,Trans.Introduction to the Theory of Computation.Beijing:China Machine Press,2000,107-109 (in Chinese).
    [3]洪帆,何绪斌,徐智勇.基于角色的访问控制.小型微型机系统,2000,21(2):198-200.
    [10]Sipser M,著;张立昂,王捍贫,黄雄,译.计算理论导引.北京:机械工业出社,2000.107-109.
    Cited by
Get Citation

杨秋伟,洪帆,杨木祥,朱贤.基于角色访问控制管理模型的安全性分析.软件学报,2006,17(8):1804-1810

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:May 19,2005
  • Revised:October 10,2005
You are the first2032795Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063