期刊文献+

RBAC在管理信息系统中的应用 被引量:2

The Application of Role-based Access Control in Management Information System
在线阅读 下载PDF
导出
摘要 管理信息系统的安全性越来越引起人们的关注,访问控制是管理信息系统经常采用的安全措施之一。本文首先介绍了基于角色的访问控制(RBAC),分析了RBAC的基本原理和思想,然后结合某飞机维修管理信息系统的开发实例,介绍了RBAC在企业信息管理系统中的设计和应用。 The security of management information system is paid more and more attention, as one of the safety precautions, access control is adopted more frequently. Role - based access control (RBAC) was introduced, and the principium and thinking of RBAC were analyzed. A development instance of aircraft maintenance management information system was presented, and the design and application of RBAC in enterprise information management system was introduced.
出处 《机床与液压》 北大核心 2006年第7期221-223,共3页 Machine Tool & Hydraulics
关键词 RBAC 访问控制 MIS RBAC Access control MIS
  • 相关文献

参考文献5

二级参考文献40

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2Ferraiolo D, Kuhn D R. Role based access control[C]. In: Proceedings of the 15th Annual Conference on National Computer Security. National Institute of Standards and Technology [J].Gaithersburg, MD, 1992: 554-563.
  • 3Ferraiolo D, Cugini J, Kuhn D R. Role based access control:features and motivations[A]. In:Proceedings of the 11th Annual Conference on Computer Security Applications [C]. IEEE Computer Society Press, Los Alamitos, CA,1995: 241-248.
  • 4Zhang Long-hua, Gail-Joon Ahn, Chu Bei-qing. A role-based delegation framework for healthcare information systems [C].SACMAT'02, June 3-4, 2002, Monterey, California, USA.
  • 5Ferraiolo D F, Barkley J F, Kuhn D R. A rolebased access control model and reference implementation within a corporate intranet [J]. ACM Transactions on Information and System Security, Feb. 1999,2(1):34-64.
  • 6Longstaff J J, Lockyer M A, Thick M G. Amodel of accountability, confidentiality and override for healthcare and other applications [C]. Proceedings of the 5th ACM workshop on RoleBased Access Control,pages 71-76, Berlin, Germany. July 26-27, 2000, Novemb
  • 7Giuri L and Iglio P. Role templates for content-based access control [J]. In 2nd ACM Workshop on Role-BasedAccess Control,Fairfax, Virginia : 153-159.
  • 8Eduardo B. Fernandez, Jie Wu, and Minjie H. Fernandez. User group struc- tures in ject-oriented database authorization [A]. In:Biskup J, Morgernstern M, and Landwehr C, editors, Database security VIII: status and prospects[M]. North- Holland, 1995.
  • 9Jonathan D Mo-ett and Morris S. Sloman. Delegation of authority[A]. In: Krishnan I and Zimmer W, editors, Integrated Network Management II [M]. Elsevier Science Publishers B.V. (NorthHolland), 1991: 595-606.
  • 10Ravi S. Sandhu,Edward J. Conyne,Hal L. Feinstein and Charles E. Youman Role-based control models [J]. IEEE Computer,Feb. 1996, 29(2):38-47.

共引文献68

同被引文献13

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部