期刊文献+

企业应用中的访问控制服务

Access Control Service for Enterprise Applications
下载PDF
导出
摘要 现代企业中存在着大量的管理信息系统,这些系统多具有独立的访问控制模块。在这种情况下,企业的安全管理员很容易因为管理系统的多样性和分布性而导致工作出错。论文介绍了一种面向企业中多个应用的基于J2EE的访问控制服务,并讨论了调用该服务的三种方法:内嵌式调用,使用JMS的内嵌式异步调用,使用JMS的分布式异步调用。论文提供的方法可以满足企业应用的不同需要。此外,还讨论了对引用监视器效率进行优化的一些方法。 Usually there are many application systems in an enterprise.These applications mostly need an access control module to control access to sensitive information in the enterprise.But it is complicated and fallible for the security administrator(or system security officer) to manage all security policies in different applications.This paper introduces an access control service for multi enterprise applications which is based on J2EE(Java 2 platform,Enterprise Edition ).The paper discusses three methods to invoke reference monitor of the access control service,embedded invoking, asynchronized embedded invoking using JMS and asynchronized distributed invoking using JMS.These methods can meet the different requirements of enterprise appllcations.finally,the paper discusses some guidelines and technologies which optimize the efficiency of reference monitor.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第5期197-200,共4页 Computer Engineering and Applications
基金 国家863高技术研究发展计划资助项目(编号:2001AA415220)
关键词 访问控制 企业应用 引用监视器 J2EE access control,enterprise application,reference monitor,J2EE(Java 2 platform,Enterprise Edition)
  • 相关文献

参考文献3

二级参考文献12

  • 1[1]Sandhu, R. Issues in RBAC . In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 21~24.
  • 2[2]Jaeger, T. On the increasing importance of constraints. In: Proceedings of 4th ACM Workshop on Role-Based Access Control. Fairefax, VA: ACM Press, 1999. 33~42.
  • 3[3]Ahn, G.-J. The RCL2000 language for specifying role-based authorization constraints [Ph.D. Thesis]. Fairfax, VA: George Mason University, 1999.
  • 4[4]Sandhu, R., Coyne, E.J., Feinstein, H.L., et al. Role-Based access control models. IEEE Computer, 1995,29(2):38~47.
  • 5[5]Chen, Fang, Sandhu, R. Constraints for role-based access control. In: Proceedings of the ACM RBAC Workshop. MD: ACM Press, 1996. 39~46.
  • 6Ferraiolo DF, Sandhu R, Gavrila S. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 2001,4(3):224-274.
  • 7Osbom S, Sandhu R. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, 2000,3(2):85-106.
  • 8AHN G-J, Sandhu R. Role-Based authorization constraints specification. ACM Transactions on Information and System Security, 2000,3(4):207-226.
  • 9Sandhu R. Issues in RBAC. In: Youman C, Sandhu R, Coyne E, eds. Proceedings of the 1st ACM Workshop on Role-based access control. ACM Press, 1996. 21-24.
  • 10Ferraiolo D, Kuhn R. Role based access control. In: Proceedings of the 15th National Computer Security Conference, National Institute of Standards and National Computer Security Center. 1992. 641-650.

共引文献105

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部