透過您的圖書館登入
IP:3.23.101.186
  • 學位論文

以角色為主之權限控管系統中階層式情境角色之研究

A Study of Context Role Hierarchy in Role-Based Access Control

指導教授 : 留忠賢

摘要


一般的權限控管(Role-Based Access Control,RBAC)系統,使用者經由角色來取得權限。但是,使用者在啟用角色或是執行權限時,可能會受到環境因素如時間和空間所影響。因此需要透過情境限制(Context Constraint)來對角色的啟用或是執行的權限作限制。 本篇論文討論以情境角色來建立情境限制模型,並將情境角色加入NIST RBAC Model,稱之為Context Role RBAC (CR-RBAC) Model。此模型包含原有NIST RBAC Model的六個元件外,多了Context Role和Context Value兩個元件,並且將權限(Permission)分成一般權限(Normal Permission)和情境權限(Context Permission)。除此之外,對於啟用情境角色取得情境權限有兩個前置動作:1.將情境權限分配到空間情境角色,2.由時間情境角色驅動空間情境角色。CR-RBAC模型中有三種不同的Role Hierarchy,包含一般性的Role Hierarchy、Temporal Context Role Hierarchy和Spatial Context Role Hierarchy,分別表示不同的角色啟用(Role Activation)和角色之間的關係。

並列摘要


In a Role-Based Access Control system, users acquire permissions by activating roles that are assigned to the users. In some cases, the roles that a user can activate or the permissions that a user can perform will be determined by temporal or spatial constraints. In this thesis, we model context constraints as context role and add context roles to NIST RBAC model. This model is called Context Role RBAC (CR-RBAC) model. The CR-RBAC model contains not only the original six components of the NIST RBAC model, but also contains context role and context values. CR-RBAC model separates permission into normal permissions and context permissions. Two actions are needed for activating context roles to acquire context permissions. First, context permissions are assigned to spatial context roles. Then, spatial context roles are activated by temporal context roles. There are three different role hierarchies in CR-RBAC model, the original role hierarchy, temporal context role hierarchy and spatial context role hierarchy, which are used to represent role relationship and role activation.

參考文獻


[2] Matthew J. Moyer and Mustaque Ahamad, “Generalized Role-Based
[12] 陳建宏, “以角色為主之權限控管系統中情境想關控管之研究與實作,” 私立中原大學資訊工程研究所碩士論文, 2005
[6] Kyu-il Kim, Hyun-Sik Hwang, Hyuk-Jin Ko, Hae-Kyung Lee and Ung-mo Kim, “Muti-Policy Access Control considering Privacy in Ubiquitous Environment,” International Conference on Hybrid Information Technology, November 2006.
[7] Ravi Sandhu, “Role Activaion Hierarchies,” Proceeding of the third ACM workshop on Role-Based Access Control, October 1998, p.33-40.
[9] Gustavo H. M. B. Motta and Sergio S. Furuie, “A Contextual Role-Based Access Control Authorization Model for Electronic Patient Record,” IEEE Transaction on Information Technology in Biomedicine, Vol.7, Issue 3, September 2003, p.202-207.

被引用紀錄


林品婕(2013)。情境角色與隔離式權限控管整合模型於工作流程之應用〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/cycu201301008
張哲誌(2012)。一種整合情境角色與隔離式權限控管模型的方法〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/cycu201200723
張皖茜(2008)。以角色為基礎且具階層式情境角色的權限控管系統間角色對應之研究與討論〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/cycu200900395
李嘉浤(2007)。以角色為基礎之權限控管系統中情境角色與情境權利關係之研究與實作〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/cycu200700404
李忠璇(2014)。在權限控管中整合情境角色與隔離式角色並應用於工作流程〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/CYCU.2014.00024

延伸閱讀