期刊文献+

一种DBMS时态授权机制研究

A Temporal Authorization Mechanism for DBMS
下载PDF
导出
摘要 通过整数限制域的方式引入时态限制域并提出一种基于DBMS的时态授权逻辑模型.该模型基于分层的限制Datalog/ ,c,并通过时态限制规则保持限制域的求反闭包性,通过授权阻塞规则解决正负授权冲突,因而具有逻辑上的一致性和可行性,能满足DBMS中各类时态授权的需要.最后对授权程序的可评价(evaluation)性、实现算法及其应用做了说明.
出处 《计算机研究与发展》 EI CSCD 北大核心 2006年第z3期228-232,共5页 Journal of Computer Research and Development
基金 航空科学基金项目(02F52033) 江苏省高技术基金项目(BG2004-005)
  • 相关文献

参考文献7

  • 1[1]E Bertino,P Samarati,S Jajodia.An extended authorization model for relational databases.IEEE Trans on Knowledge and Data Engineering,1997,1(9):85-101
  • 2[2]E Bertino,C Bettini,E Ferrari.A temporal access control mechanism for database systems.IEEE Trans on Knowl Data Eng,1996,8(1):67-80
  • 3[3]E Bertino,C Bettini,E Ferrari,et al.An access control model supporting periodicity constraints and temporal reasoning.ACM Trans on Database Systems.1998,23(3):231-285
  • 4何永忠,李斓,冯登国.多级安全DBMS的通用审计策略模型[J].软件学报,2005,16(10):1774-1783. 被引量:11
  • 5钟勇,秦小麟.基于时态的多级数据访问控制方法[J].系统工程与电子技术,2005,27(3):516-520. 被引量:1
  • 6[6]P Z Revesz.Safe stratified Datalog with integer order programs.The Conf on Principles and Practice of Constraint Programming,Cassis,France,1995
  • 7[7]D Toman.Computing the well-founded semantics for constraint extensions of Datalog.The 2nd Int'l Workshop on Constraint Database Systems,Delphi,Greece,1997

二级参考文献22

  • 1Christina Y C, Michael G, Karl L. DEMIDS: a misuse detection system for database systems[A]. Proc. of the Third Annual WIP TC-11WG 11.5 Working Conference on Integrity and Internal Control in Information Systems[C], Amsterdam, 1999. 159-178.
  • 2Liu P. Architectures for intrusion tolerant database systems [ A ]. In Proc. of 18th Annual Computer Security Applications Conference[ C],Las Vegas, 2.002. 311 - 320.
  • 3Robert S S. Applicatian intrusion detection [R]. Technical Report CS-99-17, Department of Computer Science, Univesity of Virginia, June 1999.
  • 4Chandana L, Brajendra P. On achieving fast damage appraisal in ease of cyber attacks [ A]. In Proc. of the 2001 IEEE Workshop on Information Assurance and Security[C], United States, 2000.
  • 5Zhong Yong, Qin Xiao-Lin. Adaptive data protection mechanism in intrusion tolerant multilevel secure database [ A ]. In Proc. of the Second Asian Workshop on Foundations of Software[ C], Nanjing, 2003. 21 -24.
  • 6Zhong Yong, Qin Xiao-Lin. Research on algorithm of user query frequent itersets mining [ A]. In Proc. of Third International Conference on Machine Learning and Cybernetics[ C], Shanghai, 2004. 1671 - 1676.
  • 7Can T, Michael G. Somantic integrity support in SQL: 1999 and commereial (object - ) relational database management systems [J]. The VLDB Journal, 2001,10(4): 241 - 269.
  • 8Steven D, Sabrina D C, Patrick L, et al. Maximizing sharing of protected information [J]. Jonrnal of Computer and System Science, 2002, 64(3): 496 - 541.
  • 9Marc N, Stevenne J M. An efficient symbolic representation of periodic time [ A]. In Proc. of the International Conference on Information and Knowledge Management, Lecture Notes in Computer Science[ C], Baltimore, 1993(752): 161- 168.
  • 10Elisa B, Claudio B, Elena F, et al. An access control model supporting periodicity constraints and temporal reasoning [ J ]. ACM Transactions on Database Systems, 1998,23(3): 231 - 285.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部