期刊文献+

新型的使用访问控制模型 被引量:3

New usage access control model
下载PDF
导出
摘要 对传统访问控制模型进行了扩展,提出了一种新的访问控制模型———使用控制模型UCON(usagecontrol)。这种模型包含授权、证书和条件组成成分,能解决作为访问结果而对主体客体属性进行更新的问题,以及在访问过程中对访问权限延续和即时回收的问题。同时对该模型的核心模型进行了形式化描述和定义。 This paper extends the traditional access control models and presents the new one, UCON(Usage Control), which covers authorization, obligation and condition. The UCON can not only solve the updates of subject and object attributes as a consequence of access, but also solve the continuity or immediate revocation of rights during the access. The formalized description and definition of the kernel model are also given.
出处 《信息技术》 2005年第6期27-29,87,共4页 Information Technology
关键词 访问控制模型 使用控制 安全 access control model usage control security
  • 相关文献

参考文献8

  • 1Ravi Sandhu. Lattice-based Access Control Models[J]. IEEE Computer, 1993,26(11):9-19.
  • 2Ravi Sandhu, Pierangela Samarati. Access Control: Principles and Practice[J]. IEEE Communications, 1994,(9):40-48.
  • 3Ravi Sandhu, Venkata Bhamidipati, Qamar Munawer.The ARBAC97 Model for Role-based Administration of Roles[J]. ACM Transactions on Information and System Security,1999,2(1):105-135.
  • 4Ravi Sandhu, Edward Coyne, Hal Feinstein, et al. Role-based Access Control Models[J]. IEEE Computer,1996,29(2):38-47.
  • 5Jaehong Park, Ravi Sandhu. The UCONABC Usage Control Model[J]. ACM Transactions on Information and System Security (TISSEC), 2004,(10): 1-47.
  • 6Jaehong Park, Ravi Sandhu. Towards Usage Control Models: Beyond Traditional Access Control[A]. In:Proceedings of 7th ACM Sympo-sium on Access Control Models and Technologies. SACMAT'02[C].Monterey, California, USA:ACM, 2002.57-64.
  • 7Ravi Sandhu, Jaehong Park. Usage Control: A Vision for Next Gene-ration Access Control[A]. In: Vladimir Gorodetsky, Leonard J Pop-yack, Victor A Skormin.MMM-ACNS[C]. St. Petersburg, Russia: Springer, 2003.17-31.
  • 8Sylvia Osborn, Ravi Sandhu, Qamar Munawer. Configuring Role-based Access Control to Enforce Mandatory and Discretionary Access Control Policies[J]. ACM Transactions on Information and Systems Security (TISSEC), 2000,3(2):85-106.

同被引文献17

  • 1袁磊.使用控制模型的研究[J].计算机工程,2005,31(12):146-148. 被引量:12
  • 2俞银燕,汤帜.数字版权保护技术研究综述[J].计算机学报,2005,28(12):1957-1968. 被引量:142
  • 3何建波,卿斯汉,王超.对两个改进的BLP模型的分析[J].软件学报,2007,18(6):1501-1509. 被引量:22
  • 4Park J. Sandhu R. Towards usage control models: beyond traditional access control[ C]//Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002 : 57 - 64.
  • 5Park J.Sandhu R.The UCONABC usage control model[J] .ACM Transactions on Information and Systems Security,2004,7(1):128- 174.
  • 6Sandhu R. Park J. Usage control:a vision for next generation access control[ C]//Proceedings of The 2rid International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security ,2003 : 17- 31.
  • 7Zhang Xinwen, Park J, Sandhu R. A logical specification for usage control[C]//Proceedings of 9th ACM Symposium on Access Control Models and Technologies, 2004 : 67 - 75.
  • 8Park J. Usage control :a unified framework for next generation access control[D]. Doctor dissertation,USA:George Mason University ,2003.
  • 9Park J, Sandhu R. The UCON usage control model [J]. ACM Transactions on Information and Systems Security, 2004,7 (1): 128-174.
  • 10Loscocco P, Smalley S.Integrating flexible support for security policies into the Linux operating system[R].NAI Labs,2001.

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部