计算机应用 ›› 2013, Vol. 33 ›› Issue (09): 2511-2515.DOI: 10.11772/j.issn.1001-9081.2013.09.2511

• 信息安全 • 上一篇    下一篇

基于双层角色映射的跨域授权管理模型

任志宇1,2,3,陈性元1,3,单棣斌1,2,3   

  1. 1. 河南省信息安全重点实验室,郑州 450004;
    2. 数学工程与先进计算国家重点实验室,郑州 450001
    3. 信息工程大学 四院,郑州 450001;
  • 收稿日期:2013-03-19 修回日期:2013-04-25 出版日期:2013-09-01 发布日期:2013-10-18
  • 通讯作者: 任志宇
  • 作者简介:任志宇(1974-),女,河南汤阴人,博士研究生,主要研究方向:信息安全、访问控制、授权管理;
    陈性元(1964-),男,安徽无为人,教授,博士生导师,博士,主要研究方向:信息安全、信任体系;
    单棣斌(1982-),男,河北邯郸人,讲师,硕士,主要研究方向:身份认证。
  • 基金资助:

    国家973计划项目;河南省科技创新人才计划项目

Cross-domain authorization management model based on two-tier role mapping

REN Zhiyu1,2,3,CHEN Xingyuan1,3,SHAN Dibin1,2,3   

  1. 1. Henan Province Key Laboratory of Information Security, Zhengzhou Henan 450004,China;
    2. State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou Henan 450001,China
    3. The Fourth College, Information Engineering University, Zhengzhou Henan 450001,China;
  • Received:2013-03-19 Revised:2013-04-25 Online:2013-10-18 Published:2013-09-01
  • Contact: REN Zhiyu

摘要: 针对传统跨域授权管理模型角色设置方法单一,以及有可能出现隐蔽提升、职责分离冲突等问题,提出一种基于双层角色结构的跨域授权管理模型。通过在管理域内设置双层角色,使得角色的设置与管理更加符合现实需求;采用单向角色映射的方式杜绝映射环路;引入属性、条件等动态因素,实现了权限的动态调整。采用动态描述逻辑刻画了模型中的概念、关系及管理动作。对模型的安全性分析表明,该模型满足自治性和安全性原则。

关键词: 信息安全, 多域安全互操作, 跨域角色映射, 授权管理模型, 动态描述逻辑

Abstract: With regard to the singleness of the role establishment method in the traditional cross-domain authorization management models, and the problems such as implicit promotion of privilege and the separation of duties conflict, a new cross-domain authorization management model based on two-tier role mapping was proposed. The two-tier role architecture met the practical needs of role establishment and management. On this basis, unidirectional role mapping can avoid the role mapping rings. By introducing attribute and condition, dynamic adjustment of permissions was realized. The model was formalized by dynamic description logic, including concepts, relations and management actions. In the end, the security of the model was analyzed.

Key words: information security, multi-domain secure interoperation, cross-domain role mapping, authorization management model, dynamic description logic

中图分类号: