作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2007, Vol. 33 ›› Issue (19): 147-149. doi: 10.3969/j.issn.1000-3428.2007.19.051

• 安全技术 • 上一篇    下一篇

RBAC和FBAC的适用条件与集成

潘德锋1,彭 霞2,吴信才3   

  1. (1. 华北电力大学计算机科学系,保定 071000;2. 北京大学遥感与地理信息系统研究所,北京 100871; 3. 中国地质大学信息工程学院,武汉 430074)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2007-10-05 发布日期:2007-10-05

Suitable Conditions and Integration of RBAC and FBAC

PAN De-feng1, PENG Xia2, WU Xin-cai3   

  1. (1. Department of Computer Science, North China Electric Power University, Baoding 071000; 2. Institute of Remote Sensing and GIS, Peking University, Beijing 100871; 3. School of Information Engineering, China University of Geoscience, Wuhan 430074)
  • Received:1900-01-01 Revised:1900-01-01 Online:2007-10-05 Published:2007-10-05

摘要: 用集合论的方法分析了模型选取的4个决定因素:需要授权的用户数量,功能权限集的基数,角色的权限变化情况,用户的角色变化情况。对RBAC和FBAC的适用情况进行了划分。论证了在复杂的大型系统中,综合采用多种访问控制模型,对权限进行分割合并,区分出公共权限和专门权限,并引入多级授权机制,才能够克服单一模型的不足。

关键词: 存取控制, RBAC, FBAC

Abstract: This paper analyzes the 4 factors that determine which model should be chosen with the method of set: the quantity of users, the radix of function set, the change of role’s permissions, the change of user’s roles. It partitions the different conditions that are suitable for RBAC(role-based access control) model or FBAC(function-based access control) model. This paper demonstrates that it is necessary and feasible to adopt different models in complex large system. In this kind of system, it can deal with two methods: cut apart and combine the permissions; use the mechanism of multistage assignment.

Key words: access control(AC), role-based access control(RBAC), function-based access control(FBAC)

中图分类号: