期刊文献+

数据库访问控制技术研究 被引量:2

Research on Database Access Control Technology
下载PDF
导出
摘要 访问控制是实现数据库安全的核心技术。综述了几种主流访问控制技术,介绍了最近提出的一种新的访问控制技术———使用控制(Usage Control,UCON),在此基础上从九个方面对它们进行详细比较和分析,并展望其发展趋势。 Access control is the central technology of the security of database. This paper surveys several main access control models and introduces a new one, UCON (Usage Control), which was presented recently. Based on the problem, these models are discussed and compared in detail through nine aspects. The trend of it' s development is looked forwarded to.
机构地区 西安通信学院
出处 《河南科技学院学报》 2006年第2期101-104,共4页 Journal of Henan Institute of Science and Technology(Natural Science Edition)
  • 相关文献

参考文献4

  • 1[美]格鲁曼.计算机安全[M].北京:人民邮电出版社,2003.
  • 2Sandhu R, Coyne E, Feinstein H, et al. Role - Based Access Control Models [J]. IEEE Computer, 1996,29 ( 2 ) :38-47.
  • 3Park J, Sandhu R. Towards Usage Control Models: Beyond Traditional Access Control [ A ]. Proceedings of the 7th ACM Symposium on Access Control Models and Technologies. SACMAT' 02 [C]. Monterey, California, USA: ACM,2002.57-.64.
  • 4Sandhu R, Park J. Usage Control: A Vision for Next Generation Access Control [A]. Vladimir Gorodetsky, Leonard J Popyack, Victor A Skormin. MMM - ACNS [C]. St. Petersburg, Russia: Springer,2003.17-31.

同被引文献7

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部