【正文】
consistent with the current set of laws, regulations, and practices that face their business today. Although this paper focuses on intras, the benefits, concepts and implementation of RBAC/Web are also applicable to a pany’ s inter environment where restrictive access to information is desired. RBAC Description Rolebased access control (RBAC) [1], [2], [3], [4], [5] is an alternative to traditional discretionary (DAC) and mandatory access control (MAC) policies that is attracting increasing attention [6], particularly for mercial applications. The principal motivation behind RBAC is the desire to specify and enforce enterprisespecific security policies in a way that maps naturally to an anization39。vermal39。, 2D graph. To improve readability, clarity and flexibility, the role hierarchy is anized into layers, where each layer contains another level of detail. By 39。促成客戶藉由 Web 網頁按他們的方法獲得他們想要的訊息,而不是通過處理操作員或聲音回應系統(tǒng),以增加客戶接口的效率。基于角色的訪問控制組件能被用于商務的萬維網服務器上,并且不需要服務器軟件的修正。此外,在企業(yè)內部運行的萬維網站經常是為其雇員而產生設立的。已經存在的萬維網服務器能有效地提供所有的或不存在訪問給一個特別的網站,許多流行的萬維網伺候器甚至能更清楚而又細膩地提供訪問控制,他們提供非常原始的工具來管理這些單一企業(yè)的遠程控制。 在角色以組織中的使用者其工作職責和能力為基礎的地方,每個使用者被分配一個或多個角色。 職責的分離 基于角色的訪問控制機制可能被系統(tǒng)管理人用在執(zhí)行一種政策分立的職責。根據動態(tài)的職責分離,用戶也許被授權了兩個互斥的角色,但是不能同時操控這兩個角色。)。舉例來說,當看“平面” 或 2 D 曲線圖的時候,角色關系可能已經被隱藏的情況下場景曲線圖可能被旋轉來顯示曲線圖的“背部”。因此,被授權的角色 financial_advisor 能夠創(chuàng)建和修改帳戶。 角色 internal_auditor 的表現形式是一個紅色的六面體形狀是為了說明這些角色與 account_rep 有一個“靜態(tài)權責區(qū)分”( SSD) 的關系。除此之外,當角色被應用的時候,虛擬現實建模語言的聲音能力可能可能被利用上,在引起利害沖突、 當不合適的程序被用或其他問題的時候給予聲音的警告。 最簡單的方法是經由 RBAC/Web 通用網關接口( CGI)。 RBAC URL 被 RBAC/Web CGI通過網絡服務器來處理。因為 RBAC/Web 點沒有瀏覽器上的需求 , 任何瀏覽器都能被用于一個特殊的用以增強 RBAC/Web服務器的 Web服務器。如果兩個角色間有一個動態(tài)權責區(qū)分的關系,那么他們可能同樣被一個個體所授權,但是那個個體不可能同時在兩個角色上被運用。 在圖 2中,角色 account_rep是突出的,為了顯示其他角色關系, account_rep的表現形式是一個暗球的形狀。通過一個角色,角色能開啟和展現相關的角色層或角色信息。它用來表現圖形,測試,聲音和萬維網上任意靜態(tài)或動態(tài)圖象的鏈接內容。 管理和顯示角色 使用基于角色的訪問控制 /萬維網管理工具的角色被建立和操縱。分立的職責必須是為了交易的特殊集合,沒有簡單單一的被允許去執(zhí)行所有在集合里的交易。 只有進入決定特權使用者的角色范圍之內后,使用者的全體操作才被允許。今天在此將會第一次提供給萬維網管理人一種核心管理能力和管理使用者訪問信息的方式,同時與法規(guī)流向保持一致并適應他們的商務要求。萬維網能被當作一種可供選擇的便宜而又強有力的通信形式。許多公司示范了一個設計良好的萬維網能讓他們在收益性上產生積極的效果。今天,安全管理昂貴和容易出錯是因為管理人通常單獨為每個在系統(tǒng)上的使用者指定訪問控制目錄。 on a role, the role opens to reveal the next layer of related roles or information about the role, ., the privileges associated with that role or a user membership list. RBAC Example Consider the branch office of a bank. In this environment, there are roles such as branch manager, teller, and account representative, as illustrated in Figure 2. The graph structure shows role hierarchy. The role financial_advisor inherits the role account_rep. An individual authorized for the role financial_advisor is permitted to perform all of the operations permitted to an individual authorized for the role account_rep. Thus, an individual in the role of financial_advisor is able to create and remove accounts. Because account representatives, branch managers, internal auditors, and tellers are all employees of the bank, their corresponding roles inherit the employee role. In Figure 2, the role account_rep is highlighted, appearing as a dark sphere, in order to show the other role relationships for account_rep. The roles teller and account_holder are shown as yellow rectangular solids to indicate that these roles have a Dynamic Separation of Duties (DSD) relationship with the role account_rep. This relationship is a conflict in interest relationship indicating that an individual acting in the role of account_rep cannot also be acting in either of the roles of account_holder or teller. The policy of the bank is that an account representative, an employee of the bank, can have an account in the bank but such an individual may not simultaneously process their personal account while processing accounts of others. Likewise, because a teller has an open cash drawer that must balance when closed, an individual acting in the role of account_rep and sitting at a desk away from a teller39。s navigational controls allows the user to interactively 39。s security policy to a relat