Computer Engineering and Applications ›› 2011, Vol. 47 ›› Issue (29): 121-123.

• 网络、通信、安全 • Previous Articles     Next Articles

Study on delegation with Chinese Wall security policy

YE Chunxiao1,HAN Yongzheng1,HU Haibo2   

  1. 1.College of Computer Science,Chongqing University,Chongqing 400044,China
    2.College of Software Engineering,Chongqing University,Chongqing 400044,China
  • Received:1900-01-01 Revised:1900-01-01 Online:2011-10-11 Published:2011-10-11

“Chinese Wall”安全策略中的委托研究

叶春晓1,韩永征1,胡海波2   

  1. 1.重庆大学 计算机学院,重庆 400044
    2.重庆大学 软件学院,重庆 400044

Abstract: Delegation with “Chinese Wall” must satisfy not only regular delegation constraints,but Chinese Wall Security Policy(CWSP) as well.Existing delegation models pay little attentions to this field.This paper analyzes requirements and specificities of delegation with CWSP.Based on the extension of existing delegation models,this paper defines conflict role and role activation history to describe CWSP,and gives relations to restrict delegation with CWSP.Methods and steps of delegation are proposed with CWSP based on role.This paper proposes implementation architecture and some main algorithms.

Key words: role based access control, delegation, Chinese Wall Security Policy(CWSP)

摘要: Chinese Wall下的委托要求委托过程不但满足常见的委托约束条件外,还需要满足Chinese Wall Security Policy(CWSP)。现有的委托模型很少关注CWSP下的委托。分析了CWSP下委托的需求和特殊性。在对现有委托模型扩充的基础上,定义了冲突角色和角色激活历史来体现CWSP,给出了CWSP下进行委托需要满足的关系。提出了基于角色的CWSP下委托的方法与步骤。给出了系统实现框架和主要算法。

关键词: 角色访问控制, 委托, “中国墙”安全策略