期刊文献+

数据库访问控制研究综述 被引量:16

A Survey on the Database Access Controls
下载PDF
导出
摘要 信息技术的迅速发展使数据库面临的安全更加复杂,访问控制(Access Control)是数据库安全领域的一个重要部分。本文首先回顾了传统的数据库访问控制各自存在的缺点,并总结了传统访问控制的不足之处,由此引出了现代访问控制方法——使用控制(Usage Control,UCON),在此基础上总结了数据库访问控制技术的发展现状,并指出了在此方面进行研究的难点和需要解决的关键问题,并对今后发展的趋势进行了展望。 With the rapid development of information and technology,database faces more serious security situation. Research in the access controls has been an important part of the area of the database. Firstly,we review traditional access controls and analysis shortcomings of them. Then,the paper summaries disadvantages of traditional access con- trols and introduces modern access control--usage control. Based on what we discuss,the paper gives a view of the development of the database access control. In conclusion. it points out the difficulties of research and the existing problems that must be solved. Finally,the future direction in this field is discussed.
出处 《计算机科学》 CSCD 北大核心 2005年第1期88-91,共4页 Computer Science
基金 航空科学基金(编号:02F52033)
关键词 数据库安全 使用控制 自主访问控制 DAC 角色访问控制 Database security Access control Usage control
  • 相关文献

参考文献27

  • 1Sandhu R. Relational Database Access Controls. Handbook of Informantion Secutrity Management(1992-95 Yearbook),Auerbach Publishers, 1994. 145 ~ 160
  • 2Sandhu R. Mandatory Controls For Database Integrity. In:Proc.of the IFIP WG11. 3 Workshop on Database Security,Monterey,Colifornia ,Sep. 1989
  • 3American National Standard for Information Technolology. Role Based Access Control. Information Technology Industry Council (ITI),Draft, Apr. 2003
  • 4Ferraiolo D F,et al. Proposed NIST Standard for Role-Based Access Control. ACM Transaction on Information and System Security,2001,4(3): 224~274
  • 5Graubart,Richard. On the Need for a Third Form of Access Control. In: Proc. of the 12th National Computing Security Conf.1989. 296~303
  • 6Sandhu R,Chen F. The Multilevel Relational (MLR) Data Model. ACM Transactions on Information and System Security, 1998,1(1):93~132
  • 7Sandhu R,Jajodia S. Data and Database Security and Controls.Handbook of Information Security Management, Auerbach Publishers, 1993. 481~ 499
  • 8Ferraiolo D F,Cugini J, Kuhn D R. Role Based Access Control:Features and Motivations. In: Computer Security Applications Conf. 1995
  • 9Park J,Sandhu R. Towards Usage Control Models: Beyond Traditional Access Control. SACMAT02, Monterey, Califomia, USA,ACM, 2002
  • 10Park J,Sandhu R. Originator Control in Usage Contrlol. In:3rd International Workshop on Policies for Distributed Systems and Networks(Policy02). June 2002

同被引文献97

引证文献16

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部