Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Zhejiang University(Engineering Science)》 2007-09
Add to Favorite Get Latest Update

Security violation detection for role-based access control based interoperation in distributed environment

WU Di,ZHU Miao-liang,CHEN Xi-yuan,LIN Jian(College of Computer Science and Technology,Zhejiang University,Hangzhou 310027,China)  
A security violation detection method was proposed to meet the requirements of secure interoperation among distributed systems.Role mapping mechanism was introduced among the role-based access control(RBAC) systems to implement access control across systems.The security violation of interoperation with role mappings was analyzed and the formalized definitions of secure interoperation were done.Then a minimum detection method according to the feature of distributed environment was introduced particularly.This method reduced the computation complexity by decreasing the amount of roles involved in the detection.The security violation character was further analyzed based on the minimum detection method to help administrators eliminate security violation.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 5 Hits
1 WANG Lei1, LIU Qiang2 (1.Department of Information Engineering, Guangdong Vocational College of Science and Trade, Guangzhou 510430, China; 2.Key Lab of CIMS, School of Mechatronics Engineering, Guangdong University of Technology, Guangzhou 510090, China);Security Policy Framework Design of Collaborative ASP System[J];Computer Knowledge and Technology;2010-17
2 WANG Lei1,2,CHEN Xin1,LIU Qiang1,CHEN Xin-du1(1.Key Lab of CIMS,School of Mechatronics Engineering,Guangdong University of Technology,Guangzhou 510090,China;2.Department of Information Engineering,Guangdong Vocational College of Science & Trade,Guangzhou 510430,China);Access control model of collaborative application service provider system[J];Computer Integrated Manufacturing Systems;2009-11
3 CHENG Xiang-ran,CHEN Xing-yuan,ZHANG Bin,YANG Yan(Electric Technology Institute,PLA Information Engineering University,Zhengzhou 450004,China);Research on RBAC Policy Conflict and Its Detection Algorithm[J];Computer Engineering;2010-18
4 Wang Yubin1 Zhou Yong2 Zhou Haiguang3 Yu Dongchang1 Su Debin1 Liang Feng1(1. Beijing Municipal Meteorological Bureau, 100089;2. National Meteorological Information Centre; 3. State Key Laboratory of Severe Weather, Chinese Academy of Meteorological Sciences);Application of RBAC Technique to Beijing Olympic Games Weather Service Information Issuing System[J];Meteorological Monthly;2009-03
5 GU He-wu,PAN Li(School of Electronic Information and Electric Engineering,Shanghai Jiaotong University,Shanghai 200240,China);Multi-domain Policy Conflicts and Detection Methods Based on RBAC[J];Information Security and Communications Privacy;2010-06
【Citations】
Chinese Journal Full-text Database 1 Hits
1 Liao Zhensong Jin Hai Qiang Weizhong Doctoral Candidate;College of Computer Sci.& Tech.,Huazhong Univ.of Sci.& Tech.,Wuhan 430074,China.;An improved approach towards the model of IRBAC2000[J];Journal of Huazhong University of Science and Technology;2005-S1
【Co-citations】
Chinese Journal Full-text Database 1 Hits
1 WANG Fu1,2,SHEN Han-hui1,2,ZOU Xiang1,2(1.Key Laboratory of Information Network Security,Ministry of Public Security,Shanghai 201024,China;2.The Third Research Institute,Ministry of Public Security,Shanghai 200031,China);Cross-domain role mapping method based on IRBAC[J];Journal of Computer Applications;2010-S1
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 Xue Wei Huai Jinpeng(School of Computer Science and Technology, Beijing University of Aeronautics and Astronautics, Beijing 100083, China);Extended role-based access control model[J];Journal of Beijing University of Aeronautics and Astronautics;2005-03
2 L U·· Yi-hong, SONG Han-tao, GONG Yuan-ming (Dept. of Computer Science and Engineering, Beijing Institute of Technology, Beijing100081, China);An Analysis About Role Permission and Role Hierarchy Based on an Improved Role Based Access Control Model[J];Journal of Beijing Institute of Technology;2002-05
3 Yang Yang, Ding Renjie, Min Yong(Tsinghua University, Beijing 100084, China);OBJECT-BASED ACCESS CONTROL MODEL[J];Automation of Electric Power Systems;2003-07
4 GUO Xiao-yu,GUO Hui,LIU Chun-yu(Dept.of Electronic and Communication,North China Electric Power University,Baoding 071003,China);Study on MIS for integrated automation & tele-control based on B/S structure[J];Telecommunications for Electric Power System;2006-01
5 YANG Qi,WANG Xiaojing,QI Tongyan (Research Institute of Highway,Beijing 100088,China);Intelligent Transport Systems Standards Architecture Research[J];Journal of Highway and Transportation Research and Development;2004-07
6 SUN Hu (Information Management Section,Yancheng Taxtion Bureau,Yancheng 224001,China);Research on Access Control Model[J];Computer Knowledge and Technology(Academic Exchange);2007-08
7 CHEN Zhi-hao, DING Yue-wei, YANG Xin-yu (College of Computer Engineering, University of Shanghai for Science and Technology,Shanghai 200093,China);Development and application of custom pagination tag in JSP[J];Journal of University of Shanghai For Science and Technology;2004-02
8 ZHANG Yong1,XIE Gang1,ZHANG Shen-tao2 (1.Armored Forces Engineering,Institute of PLA,Beijing 100072,China;2.63610 PLA Troops,Korla 841001,China);Application of variable weights fuzzy comprehensive assessment in efficiency evaluation of radar[J];Information Technology;2007-12
9 Shao Junli;He Yajuan(Nanjing Rlectronic Communicalion Institute,Nanjing, 210016);System Interoperability[J];FIRE CONTROL & COMMAND CONTROL;1995-03
10 ZHAN Ze-hui1,PENG Zi-cheng2(1.Educational Technology Information Centre,South China Normal University,Guangzhou 510631,China;2.School of Physics and Engineering,Sun Yat-sen University,Guangzhou 510275,China);THE DESIGN AND IMPLEMENTATION OF RBAC SYSTEM BASED ON LMS[J];Journal of South China Normal University(Natural Science Edition);2007-04
【Secondary References】
Chinese Journal Full-text Database 3 Hits
1 WANG Ying CHANG Jun LI Yongli KANG Li WEN Jianwei ZHANG Li ZHANG Delong Inner Mongolia Meteorological Information Center,Hohhot 010051;Inner Mongolia Weather Bureau Integrated Information System Design and Complementation Methods[J];Meteorological Monthly;2010-04
2 YAO Zuoxin MA Xubin The Operational Dpartment of Xinjiang Meteorological Bureau,Urumqi 830002;The Project of IPSTAR Integrated Communication System in Remote Meteorological Stations[J];Meteorological Monthly;2010-05
3 Ma Xiaolin1,Ma Zhongyuan2,Huang Shuilin1,Yan Bing3 (1.Lushan Meteorological Bureau of Jiangxi,Jiujiang 332900;2.Jiangxi Institute of Meteorological Science,Nanchang 330046;3.Jiangxi Service Center of Meteorological Science and Technology,Nanchang 330046);Practice and thinking on weather service for important social activities in Lushan[J];Meteorological,Hydrological and Marine Instruments;2010-03
China Proceedings of conference Full-text Database 1 Hits
1 Ma Xiaolin1 Ma Zhangyuan2 Huang Shuilin1 Yan Bing3 1 Lu Shan Meteorological Bureau, Jiujiang 332900 2 Jiangxi Provincial Institute of Meteorological Science, Nanchang 330046 3 Jiangxi Prouincial Seruice Center of Meteorological Science and Technology,Nanchang 330046;Practice and Thinking on Weather Service for Important Social Activities in LuShan[A];[C];2010
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved