Research and Implementation of Mixed Access Control Model

Article Preview

Abstract:

The scale of modern systems is increasingly large, the system safety requirements have become more sophisticated, a single access control model could not do. In view of this situation, this paper presents a core RBAC, integration MAC, DAC thought and proposed a hybrid access control model - M-AC model (Mixed Access Control Model). The model is fully three kinds of advantages of the traditional access control model to eliminate each other's shortcomings, to meet the large-scale complex systems, the stringent requirements for access control. In the formal definition is given of the model, as well as rules, with an actual project, the implementation of the model methods are analyzed and studied.

You might also be interested in these eBooks

Info:

Periodical:

Key Engineering Materials (Volumes 474-476)

Pages:

1081-1086

Citation:

Online since:

April 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] BAO Lian-cheng, ZHAO Jing-bo. A Survey on Access Control Technology[J]. ELECTRIC DRIVE AUTOMATION. Vol. 28, No. 4, 2006, 2(84): 1-5.

Google Scholar

[2] David F. Ferraiolo ,D. Richard Kuhn. Role-Based Access Controls[C]. 15th National Computer Security Conference (1992), Baltimore MD pp.554-563.

Google Scholar

[3] David E. Bell and Leonard J. LaPadula, Secure Computer Systems: Mathematical Foundations, ESD-TR-73-278, Vol. I, Electronic Systems Division, Air Force Systems Command, Hanscom AFB, Bedford, MA 01731 (Nov. 1973).

Google Scholar

[4] WEI Yong-he; YUE Ming-kai. Role-based Mandatory Access Control Model [J]. Journal of Detection & Control, 2009, 31(4): 74-78.

Google Scholar

[5] Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein et al. Role-Based Access Control Models. IEEE Computer, 1996, 29(2): 38-47.

DOI: 10.1109/2.485845

Google Scholar

[6] Zhou Wei. The Application and Research on RBAC model based on Task and resource abstract[D], xiangtan University, (2007).

Google Scholar

[7] Osborn S., Sandhu R., Munawer Q. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, 2000, 3(2): 85-106.

DOI: 10.1145/354876.354878

Google Scholar

[8] Zhang Kejun; Jin Wei; Yang Bingru. Role-based Discretionary Access Control Construction [J]. Computer Engineering, 2005, 31(5): 25-27.

Google Scholar

[9] Chen Wang, Li Zhong-xue, Zhang Mao-jun. Research on Uniform Model of RBAC and MAC [J]. Journal of Chinese Computer Systems. 2008, 29(3): 422-427.

Google Scholar

[10] Huang Yi Min; Ping Ling Di; and Pan Xue Zeng.Design of an Extended Role-Based Access Control Model and Its Impementation [J]. Journal of Computer Research and Development, 2003, 40(10): 1521-1528.

Google Scholar