高级检索
    李晓峰 冯登国 徐 震. 一种通用访问控制管理模型[J]. 计算机研究与发展, 2007, 44(6): 947-957.
    引用本文: 李晓峰 冯登国 徐 震. 一种通用访问控制管理模型[J]. 计算机研究与发展, 2007, 44(6): 947-957.
    Li Xiaofeng, Feng Dengguo, and Xu Zhen. A Generic Access Control Administration Model[J]. Journal of Computer Research and Development, 2007, 44(6): 947-957.
    Citation: Li Xiaofeng, Feng Dengguo, and Xu Zhen. A Generic Access Control Administration Model[J]. Journal of Computer Research and Development, 2007, 44(6): 947-957.

    一种通用访问控制管理模型

    A Generic Access Control Administration Model

    • 摘要: 目前的访问控制管理模型都是针对某种特定的访问控制模型提出的,不能适应多访问控制模型共存于一个大型系统的情况,一个管理模型不能同时适用于多访问控制模型的主要原因是管理者管理范围定义包含了某种访问控制模型中特有的组件.通过使用各种访问控制模型中共有的主体和权限来定义管理模型中的管理范围,将管理模型与访问控制模型之间的关系抽象为一个用于计算策略相关管理范围的函数,提出了一种能够用来管理不同访问控制模型的通用访问控制管理模型,为了便于模型实际使用,在模型中引入管理空间的概念与实际组织结构相对应,形成分布式访问控制管理结构,同时模型严格区分了管理空间的直接管理者和间接管理者在管理权限上的不同,使得管理者具有一定的自治性.最后讨论了管理模型中的管理规则和语义,证明了模型的完备性,并讨论和分析了针对不同访问控制模型的policy\+*算法.

       

      Abstract: Current access control administration models that are designed to manage given access control models are not suitable for enterprise environment in which different access control models coexist. An administration model is needed for efficiently administrating different access control models in enterprise environment. The main reason why an administration model can't be used to manage other access control models is that the administration scopes defined in the model include characteristic components of the given access control model. This paper uses subject and permission that are common in different access control models to describe administration scope, abstracts interface between administration model and access control model to policy\+* functions and proposes a generic administration model. The model introduces the concept of management space that corresponds with real enterprise structure and makes the model easily understood by managers, and the administration tasks are achieved hierarchically. For autonomy, the model differentiates the direct manager's administration privileges from the indirect manager's administration privileges of one management space. Also discussed are the administration rules and semantics of the model. The model soundness is proved, and policy\+* algorithms of RBAC, MAC and HRU are analyzed. This model can be used to administrate different access control model in an enterprise environment. An example is given, which explains how to use this model to manage RBAC, MAC and HRU.

       

    /

    返回文章
    返回