期刊文献+

基于AC的XACML访问控制模型的设计及实现 被引量:4

Design and Implementation of XACML Access Control Model Based on AC
下载PDF
导出
摘要 通过分析传统访问控制模型及其实现机制的优缺点,提出了一种基于AC证书的XACML访问控制模型及其实现方法,并对模型的安全性进行了分析。 By analyzing the features of traditional access control models and relative implementation mechanism, puts forward an XACML access control model based on AC and its realizing methods. The security of this model is also analyzed.
出处 《计算机应用研究》 CSCD 北大核心 2006年第10期133-136,共4页 Application Research of Computers
基金 国防科技基础研究项目(20021823)
关键词 访问控制 AC XACML 安全性 Access Control AC XACML Security
  • 相关文献

参考文献12

  • 1DoD 5200,28-STD,Trusted Computer System Evaluation Criteria[S].Department of Defence Computer Security Center,1985.
  • 2邓集波,洪帆.基于任务的访问控制模型[J].软件学报,2003,14(1):76-82. 被引量:222
  • 3S H von Solms,Isak van der Merwe.The Management of Computer Security Profiles Using a Role-Oriented Approach[J].Computer & Security,1994,13(8):673-680.
  • 4Hwang M S,Tzeng W G,Yang W P.A Two-key-lock-pair Access Method Using Prime Factorization and Time Stamp[J].IEICE Trans.,Inf.& Syst.,1994,E77-D(9):1042-1046.
  • 5ITU-T Recommendation X.509,the Directory:Public-key and Attri-bute Certificate Frameworks[S].
  • 6Joon S Park,Ravi Sandhu,SreeLatha Ghanta.RBAC on the Web by Secure Cookies[EB/OL].http://www.list.gmu.edu/confrnc/ifip/ifip99-cookies.pdf,2005-03.
  • 7An Internet Attribute Certificate Profile for Authorization[S].RFC 3281,2002.
  • 8D W Chadwick,O Otenko.The PERMIS X.509 Role Based Privilege Management Infrastructure[EB/OL].http://sec.isi.salford.ac.uk/download/SACMATfinal.pdf,2002.
  • 9D W Chadwick,A Otenko.RBAC Policies in XML for X.509 Based Privilege Management[EB/OL].http://sec.isi.salford.ac.uk/download/Sec2002Final.pdf,2002.
  • 10OASIS.eXtensible Access Control Markup Language(XACML),version 2.0[EB/OL].http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf,2005-02-01.

二级参考文献1

共引文献221

同被引文献16

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部