期刊文献+

SNMP访问控制增强的设计与实现

Design and Implement of Enhanced SNMP Access Control
下载PDF
导出
摘要 简单网络管理协议(SNMP)提供了一种监控和管理计算机网络的系统方法.在v3版本的基础上扩展了其访问控制方式,提供包括基于视图以及时间约束特性角色控制的两种访问控制方式,使之具有简单、灵活、表达力强、可用性强等特点.实际应用表明,增强后的SNMPv3在访问控制方面更符合实际需求,使用更方便. SNMP provides a way to manage and monitor the computer network. By extending its access control model on the 3^rd version, the paper offers two methods : view based access control model(vacm) and role based access control model. It enhances RBAC's power and function. In use SNMPv3 based on Time Enhanced RBAC is more efficient and useful.
出处 《江南大学学报(自然科学版)》 CAS 2007年第3期319-322,共4页 Joural of Jiangnan University (Natural Science Edition) 
关键词 简单网络管理协议 角色访问控制 时间约束 SNMP role based access control time constrain
  • 相关文献

参考文献5

二级参考文献30

  • 1David Zeltserman.SNMPv3与网络管理[M].北京:人民邮电出版社,2000.120-127.
  • 2R S Sandhu, E J Coync, H L Fcinstcin et al. Role-based access control model. IEEE Computer, 1996, 29(2): 38-47.
  • 3R Sandhu, D Ferraiolo, R Kuhn. The NIST model for role-based access control: Towards a unified standard. In: Proe of the 5th ACM Workshop on Role Based Access Control. Berlin, Germany: ACM Press, 2000. 47-63.
  • 4K Izaki, K Tanaka, M Takizawa. Access control model in obiectoriented systems. In: Proc of the 7th Int'l Conf on Parallel and Distributed Systems: Workshops. Iwate, Japan: IEEE Computer Society, 2000. 69-74.
  • 5M J Moyer, M Ahamad. Generalized role-based access control. In: Proc of the 21st Int'l Conf on Distributed Computing Systems. Phoenix: IEEE Computer Society, 2001. 391-398.
  • 6D Ferraiolo, R Sandhu, S Gavrila et al. A proposed standard for role-based access control. NIST. 2000. http://csrc. hist. gov/rbae/.
  • 7D K Gifford, P Jouvelot, M A Sheldon et al. The research file systems. In: Proc of the 12th ACM SIGOPS Symposium on Operating Systems Principles. Pacific Grove, CA: ACM Press,1991. 16-25.
  • 8WFMC.TC00-1019:Workflow Management Coalition Workflow Security Considerations White Paper.1998.
  • 9Ravi S Sandhu et al.Role-based Access Control Models[J].IEEE Computer, 1996; 38-47.
  • 10Savith Kandala,Ravi Sandhu.Secure Role-Based Workflow Models. http ://www.list.gmu.edu/confrnc/ifi p/i01-rbwm.pdf.

共引文献104

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部