期刊文献+

基于属性的访问控制模型 被引量:80

Model for attribute based access control
下载PDF
导出
摘要 利用受限数据库为理论对访问请求、属性权威、策略和判定过程的抽象描述,给出了一个基于属性的访问控制模型,讨论了模型中访问请求、属性权威、策略和判定过程之间的关系,给出了一个访问控制判定过程可终止的一种特定条件。 Constrained database was used to abstractly describe access request, attribute authority, policies and decision procedure. An attribute based access control model was proposed. The relationships among access request, attribute authority, policies and decision procedure were discussed. A special condition on which the decision procedure is terminable is proposed.
出处 《通信学报》 EI CSCD 北大核心 2008年第4期90-98,共9页 Journal on Communications
基金 国家自然科学基金资助项目(60603017) 国家高技术研究发展计划(“863”计划)基金资助项目(2006AA01Z454) 国家科技支撑计划基金资助项目(2006BAH02A02,2006BAK08B06,2006BAK08B03)~~
关键词 访问控制 基于属性的访问控制 属性 受限数据库 access control attribute based access control attribute constrained database
  • 相关文献

参考文献14

  • 1ZHANG X, LI Y, NALLA D. An attribute-based access matrix model[A]. Proceedings of the 2005 ACM Symposium on Applied Computing[C].2005.359-363.
  • 2WANG L Y, WIJESEKERA D, JAJODIA S. A logic-based framework for attribute based access control[A]. Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering[C].2004.45-55.
  • 3BARKER S, STUCKEY P J. Flexible access control policy specification with constraint logic programming[J]. ACM Trans Inf Syst Secur, 2003,6(4): 501-546.
  • 4LI N H, MITCHELL J C, Datalog with constraints: a foundation for trust-management languages[A]. Proceedings of the Fifth International Symposium on Practical Aspects of Declarative Languages (PADL 2003)[C], New Orleans, Louisiana, 2003.28-73.
  • 5REVESZ E Introduction to Constraint Databases[M]. New York: Springer-Verlag, 2002.
  • 6钟勇,秦小麟,郑吉平,林冬梅.一种灵活的使用控制授权语言框架研究[J].计算机学报,2006,29(8):1408-1418. 被引量:15
  • 7ZHANG X W, PARISI-PRESICCE F, SANDHU R, et al. Formal model and policy specification of usage control[J]. ACM Transactions on Information and System Security (TISSEC), 2005, 8(4): 351-387.
  • 8DAHR M. Deductive Databases: Theory and Applications[M]. USA: International Thomson Computer Press, 1997.
  • 9ULLMAN J. Principles of Database and Knowledge-Base Systems(volume Ⅰ and volume Ⅱ)[M]. Rockville MA:Computer Science Press, 1989.
  • 10ISO/IEC 10181-3:1996 Information Technology-Open Systems Interconnection-Security Frameworks for Open Systems: Access Control Framework (Corresponding to Chinese Standard GB/T 18794.3-2003)[S].

二级参考文献17

  • 1Park J. , Sandhu R.. Towards usage control models: Beyond traditional access control. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies,Monterey, California, USA, 2002, 57-64
  • 2Park J., Sandhu R.. The UCONABC usage control model.ACM Transactions on Information and System Security, 2004,7(1): 128- 174
  • 3Woo T. Y. C. , Lam S. S.. Authorizations in distributed systems: A new approach. Journal of Computer Security, 1993, 2(2): 107-136
  • 4Jajodia S. , Samarati P. , Sapino M.L. et al. Flexible support for multiple access control policies. ACM Transactions on Database Systems, 2001, 26(2): 214-260
  • 5Li Ning-Hui, Grosof B. , Feigenbaum J.. A practically implementable and tractable delegation logic. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000, 27-42
  • 6Li Ning-Hui, Mitchell J. C.. Datalog with constraints: A foundation for trust-management languages. In: Proceedings of the 5th International Symposium on Practical Aspects of Declarative Languages, New Orleans, USA, 2003, 58-73
  • 7Bertino E. , Catania B. , Ferrari E. et al. A logical framework for reasoning about access control models. In: Proceedings of the 6th ACM Symposium on Access Control Models and Technologies Table of Contents, Chantilly, Virginia, USA, 2001,41-52
  • 8Bertino E. , Catania B. , Gori R.. Active-U-Datalog: Integrating active rules in a logical update language. In: Proceedings of the International Seminar on Logic Databases and the Meaning of Change, Schloss Dagstuhl, Germany, 1998, 107-133
  • 9Revesz P. Z.. Safe stratified Datalog with integer order programs. In: Proceedings of the Principles and Practice of Constraint Programming, Cassis, France, 1995, 154-169
  • 10Revesz P. Z.. A closed form evaluation for Datalog queries with integer order. In: Proceedings of the ard International Conference on Database Theory, Paris, France, 1990, 187-201

共引文献14

同被引文献719

引证文献80

二级引证文献886

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部