期刊文献+

分布式对象柔性化访问控制方法 被引量:6

Flexible access control method of distributed objects
下载PDF
导出
摘要 传统的访问控制机制由于将安全策略与安全机制融为一体 ,只能支持一种安全策略 .为了使访问控制机制能够动态支持多种安全策略 ,引入了元策略概念 ,并利用元策略描述框架与基于元策略的访问控制策略模型 ,提出了一种柔性化访问控制方法 ,使访问控制机制能够将安全策略与安全策略决策机制剥离 ,并能够动态支持多种安全策略 .上述方法已经在基于CORBA的实验系统中实现 。 The traditional access control mechanism is bonded with the security policy and it can only support one policy. In order to establish a kind of access control mechanism supporting multiple policies, the meta-policy concept was introduced. By using the meta-policy description framework and the security policy model based on the meta-policy concept, a method of building flexible access control mechanism was put forward, which made the access control mechanism separate the security policy from the policy decision function and could dynamically support multiple security policies. The method is implemented in a CORBA-based system and the test results show that it is effective.
出处 《北京航空航天大学学报》 EI CAS CSCD 北大核心 2004年第5期452-455,共4页 Journal of Beijing University of Aeronautics and Astronautics
基金 国家自然科学基金资助项目 ( 60 2 0 3 0 2 6) 航空基金资助项目 ( 0 2F5 10 64 )
关键词 信息处理 安全技术 计算机网络 分布式对象 访问控制 Computer networks Data processing Information management Mathematical models Object oriented programming Security of data Structures (built objects)
  • 相关文献

参考文献6

  • 1[1]Object Management Group. CORBA security services specification[PB/OL]. http://www.omg.org, 2001,1(7)
  • 2[2]Iona Company. Iona Programmers' Guide[CP/DK]. Http: ∥www. Iona. Com//products/orbix2000, 2002
  • 3[3]Sandhu R S, Samarati P. Access control: principles and practice [J],IEEE Communication Magazine,1994,32(9): 40~48
  • 4[4]Timothy J F. An object-oriented framework for security policy representation[D]. Champaign, luinois: UIUC, 1997
  • 5[5]Dirk J, Klaus R. D. An approach for building secure database federations[A]. In :Proc.lnt'l. Conf. On Very Large Data Bases[C].San Francisco: Morgan Kaufmann Publishers Inc, 1994.24 ~ 35
  • 6[6]Rabitti F, Bertino E, Kim W, et al. A model of authorization for next-generation database systems [J]. ACM Trans. On Database Systems, 1991,16(1): 89 ~ 131

同被引文献24

  • 1韩坚华,汤庸,许孝元,冯永晋.基于Internet/Intranet的COM支持的通用考试(练习)系统的设计与实现[J].计算机工程与应用,2004,40(21):230-232. 被引量:4
  • 2徐颖蕾,张群,卞飞.基于Petri网的应用软件开发及其关键技术[J].曲阜师范大学学报(自然科学版),2005,31(2):53-56. 被引量:4
  • 3张新长,叶圣涛.基于三层构架的空间数据库分布式体系结构[J].中山大学学报(自然科学版),2005,44(6):131-133. 被引量:4
  • 4Ravi S. Sandhu, Edward J. Coynek, Hal L. Feinsteink and Charles E. Youmank, Role-Based Access Control Models, IEEE Computer, Vol.29, Number 2, February 1996, pages 38-47.
  • 5CORBA Component Model Specification , OMG Available Specification, Version 4.0,2006.4.
  • 6Orfali,Robert,Dan Harkey,and Jeri Edwards.The Essential Client/Server Survival Guide[R].New York:John Wiley & Sons,Inc.,2006.
  • 7MichaelisM 宋丽红译.COM+编程指南[M].北京:机械工业出版社,2002..
  • 8Object Management Group. The common Object Request Broker:Architecture and Specification , Version 2. 6, Dec. 2001.
  • 9ISO/IEC 10181-3 Security frameworks for open systems-Access control framework, 1996.
  • 10Marchetti C, Verde L, Baldoni R. CORBA Request Portable Interceptors: A Performance Analysis. Conf. On Very Large Data Bases, Santiego, Chile, 1994. 24~ 35.

引证文献6

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部