• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2011, Vol. 33 ›› Issue (9): 24-28.

• 论文 • 上一篇    下一篇

基于认证可信度的用户权限控制技术研究

魏立峰,丁滟,陈松政,何连跃   

  1. (国防科学技术大学计算机学院,湖南 长沙 410073)
  • 收稿日期:2009-09-01 修回日期:2009-12-08 出版日期:2011-09-25 发布日期:2011-09-25
  • 作者简介:魏立峰(1973),男,山东聊城人,博士,副研究员,研究方向为系统软件和计算机安全。丁滟(1977),女,内蒙古呼和浩特人,博士,助理研究员,研究方向为系统安全和云计算安全。陈松政(1971),男,安徽祁门人,副研究员,研究方向为系统软件、信息安全和可信计算。何连跃(1971),男,浙江武义人,博士,副研究员,研究方向为信息安全、分布文件系统、操作系统。

Research on User’s Rights Control Technology Based on Authentication Trustworthiness

WEI Lifeng,DING Yan,CHEN Songzheng,HE Lianyue   

  1. (School of Computer Science,National University of Defense Technology,Changsha 410073,China)
  • Received:2009-09-01 Revised:2009-12-08 Online:2011-09-25 Published:2011-09-25

摘要:

认证可信度体现了用户身份的可信程度。本文基于用户认证可信度实施用户登录限制、用户角色获取限制及角色强制访问控制策略权限限制,提出了基于认证可信度的用户权限控制技术。将认证可信度与用户访问系统结合,要求用户访问系统必须具有相应的认证可信度,具有重要身份的用户必须通过重要的身份认证机制的认证。在角色定权中结合认证可信度,根据用户认证可信度确定用户可以激活的角色,确定角色被激活后的访问控制权限,并参与到各强制访问控制策略实施中,真正实现认证与访问授权的有机统一,解决权限的不当获取。最后指出了进一步研究的内容。

关键词: 认证可信度, 强制访问控制, 角色定权, 访问授权

Abstract:

Authentication trustworthiness reflects the degree of trustworthiness of the user who has passed system authentication. Based on authentication trustworthiness, logging in  is restricted, user’s role and role’s mandatory access control rights are restricted, and then the user’s rights control technology is proposed. Combing authentication trustworthiness with accessing systems, it requests that the user must have some authentication trustworthiness when he wants to access a system, and the important user must pass an important identity authentication mechanism. Applying authentication trustworthiness to RBA(Role Based Authorization), it can decide which role can be activated by the user, and also can decide what rights can be activated by the active role of the user, and reflects on every mandatory access control policy, it implements the unification of authentication and access authorization, solves the problem of improper right obtaining. Finally, more contents to be studied are pointed out.

Key words: authentication trustworthiness;mandatory access control;role based authorization;access authorization