首页 | 本学科首页   官方微博 | 高级检索  
     

一种遗留系统中访问控制策略的再工程方法
引用本文:李寒,郭禾,冯欣,王宇新,杨元生.一种遗留系统中访问控制策略的再工程方法[J].小型微型计算机系统,2012,33(7):1522-1527.
作者姓名:李寒  郭禾  冯欣  王宇新  杨元生
作者单位:1. 大连理工大学计算机科学与技术学院,辽宁大连,116024
2. 大连理工大学软件学院,辽宁大连,116620
3. 中国人民解放军66444部队,北京,100042
摘    要:基于角色的访问控制是目前应用最广泛且先进的安全控制机制.针对它被广泛应用于新软件,却未被遗留系统普遍采用的问题,提出一种访问控制策略的再工程方法.方法定义了描述、操作和评估访问控制策略的面向转换的访问控制策略语言,研究了提取遗留访问控制策略的方法,并给出将角色引入遗留访问控制策略的转换规则和算法.案例分析表明方法是可行的,它能够使用角色和角色层次重组遗留访问控制策略,以改善遗留系统的访问控制机制.

关 键 词:访问控制策略  再工程  遗留系统  基于角色的访问控制

Approach to Reengineering Access Control Policies in Legacy Systems
LI Han , GUO He , FENG Xin , WANG Yu-xin , YANG Yuan-sheng.Approach to Reengineering Access Control Policies in Legacy Systems[J].Mini-micro Systems,2012,33(7):1522-1527.
Authors:LI Han  GUO He  FENG Xin  WANG Yu-xin  YANG Yuan-sheng
Affiliation:1(School of Computer Science and Technology,Dalian University of Technology,Dalian 116024,China) 2(School of Software,Dalian University of Technology,Dalian 116620,China) 3(People’s Liberation Army 66444,Beijing 100042,China)
Abstract:Role-based access control is currently accepted as the most commonly used and advanced access control policy.Since it is primarily applied to ensure the security of new software systems rather than legacy systems,an approach is proposed to reengineering legacy access control policies.The approach defines a transformation oriented access control policy language,studies the method of exacting legacy access control policies and gives a set of transformation rule and an algorithm to achieve access control policy reorganization.A case study is demonstrated to depict the proposed approach is a feasible approach to improve the performance of legacy access control policies by introducing roles and role hierarchy.
Keywords:access control policy  reengineering  legacy system  role-based access control
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号