透過您的圖書館登入
IP:18.219.14.63
  • 學位論文

RBAC權限控管系統中動態責任分離機制之研究

A Study on Dynamic Separation of Duties in Role-Based Access Control System

指導教授 : 留忠賢
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


由於資訊的發達,以往企業的人工作業模式也逐漸轉成以電腦化的方式作業,因此控管使用者的權限控管變成極為重要。但對於系統管理員而言,如何維護使用者的權限卻不是一件簡單的事情。以角色為基礎的存取控制(Role-Based Access Control, RBAC),利用了使用者–角色–權限的對應方式,比起傳統的Access Control List,可以大幅降低管理上的困難,動態權責分離(Dynamic Separation of Duty, DSD)是RBAC中的一個重要的延伸功能,某些有衝突的角色可以同時分派給同一個使用者,但是這些角色不能同時啟動。 本篇論文主要是討論在一個權限控管系統中,加入動態權責分離的機制,可讓系統管理者設定角色間的動態衝突之關係,且提供使用者在動態衝突的情況下,設定其在登入系統時可同時啟動的角色。

並列摘要


Due to the development of information technologies, more and more manual operations in enterprises are replaced by computerized operations. Thus, it is important to control user’s access permissions to enterprise information. The Role-Based Access Control uses Roles as a mapping between users and permissions, which can simplify the management of the access rights. Dynamic Separation of Duty is an important characteristic of RBAC, which means that one can assign some DSD roles to a user, but those roles can not be activated at the same time. In this thesis, we will research on how to design and implement DSD in an access control system. An administrator can specify the DSD relationship between the roles, and a user can select which DSD roles to be activated when he or she logins.

並列關鍵字

RBAC DSD Role Access Control

參考文獻


[2] Ravi Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman, “Role-Based Access Control Model”, IEEE Computer, 29(2)., February 1996, 38-47
[9] JEAN BACON, KEN MOODY, and WALT YAO, “A Model of OASIS Role-Based Access Control and Its Support for Active Security”, ACM Transactions on Information and System Security, Vol. 5, No. 4, November 2002, 492–540.
[1] David Ferraiolo and Richard Kuhn, “Role-Based Access Control”, In Proceedings of 15th NIST-NCSC National Computer Security Conference, October 1992.
[3] DAVID F. FERRAIOLO, JOHN F. BARKLEY, and D. Richard Kuhn, “A Role-Based Access Control Model and Reference Implementation Within a Corporate Intranet”, ACM Transactions on Information and System Security, Vol. 2, No. 1, February 1999, 34–64.
[4] MATUNDA NYANCHAMA and SYLVIA OSBORN, “The Role Graph Model and Conflict of Interest”, ACM Transactions on Information and System Security, Vol. 2, No. 1, February 1999, 3–33.

被引用紀錄


楊聰連(2011)。企業治理、風險及遵循解決方案導入之個案研究-以職責分離資訊系統為例〔碩士論文,國立中央大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0031-1903201314424137

延伸閱讀