期刊文献+

基于角色访问控制模型的缓存机制研究 被引量:2

Research on Cache Strategy Role-based Access Control Model
下载PDF
导出
摘要 在基于角色的访问控制(RBAC)模型的实现系统中,考虑到查询操作远多于修改操作,文章引入缓存机制,通过记录历史数据以提高后续查找的效率。讨论了4种缓存策略,给出了相应的缓存算法,并对算法的优劣进行了比较。在一个实际的访问控制系统WebDaemon中使用了缓存机制,证明查询效率得到了明显的提高。 In implementations of role-based access control (RBAC) models, considering that query operations are far more than modification operations, this paper introduces cache strategy to improve the overall efficiency of subsequent queries by using historical queries. Four cache strategies are discussed, and the algorithms are given to each cache strategy respectively, and then it compares these cache algorithms, it uses cache mechanism in WebDaemon, a role-based access control system, which improves query efficiency remarkably.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第12期142-144,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60373002)
关键词 基于角色的访问控制 缓存 网络安全 Role-based access control Cache Network security
  • 相关文献

参考文献5

  • 1Ferraiolo D,Kuhn R.Role-based Access Control[C].Proceedings of the NIST-NSA National (USA) Computer Security Conference,1992:554-563.
  • 2Sandhu R,Coyne E,Feinstein H,et al.Role-based Access Control Models[J].IEEE Computer,1996,29(2).
  • 3Denning D E.A Lattice Model of Secure Information Flow[J].Communication of the ACM,1976,19(2):236-243.
  • 4Lampson B.Protection[C].Proceeding of the 5^th Symposium on Information Sciences and Systems,Princeton,NJ,1974:437-443.
  • 5桂艳峰,林作铨.一个基于角色的Web安全访问控制系统[J].计算机研究与发展,2003,40(8):1186-1194. 被引量:20

二级参考文献21

  • 1R Sandhu, V Bhamidipati, O Munawer. The ARBAC97 model for role-based administration of roles. ACM Trans on Information and System Security, 1999, 2( 1 ) : 105--135.
  • 2J Luciani. Server cache synchronization protocol (SCSP). RFC2334, 1998.
  • 3D Wessles, K Claffy. Application of Internet cache protocol(ICP), version 2. RFC 2187, 1997.
  • 4D Wessles, K Claffy. Internet cache protocol(ICP), version 2.RFC 2186, 1997.
  • 5D Wessles, K Claffy. ICP and the squid Web cache. National Laboratory for Applied Network Research. 1997. http://www. nlanr, net/-- wessels/Papers /icp-squid. ps. gz.
  • 6D Wessels. The squid intemet object cache. National Laboratory for Applied Network Research. 1997. http.//squid. nlanr.net/Squid/
  • 7EnCommerce. getAccess. 2001. http://www. encommerce.com/products.
  • 8R Sandhu, E Coyne, H Feinstein et al. Role-based access control model. IEEE Computer, 1995, 29(1): 38--47.
  • 9J Park, R Sandhu, G Ahn. Role-based access control on the Web.ACM Trans on Information and System Security, 2000, 4( 1 ) : 37--71.
  • 10C Ramaswamy, R Sandhu. Role-based access control features in commercial database management systems. In: Proc of the 21st National Information Systems Security Conf. CA: ACM Press,1998.

共引文献19

同被引文献15

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部