期刊文献+

使用控制访问模型的研究 被引量:3

Survey of usage access control model
下载PDF
导出
摘要 分析了现今高度动态和分布式环境下,传统的访问控制模型已不能满足信息访问的需要,并由此引出了下一代访问控制模型——使用控制模型(usage control,UCON)。将UCON与传统访问控制模型进行了比较,分析了UCON的定义及组成成分,给出了UCON的16种基本核心模型形式化描述及应用实例,分析了UCON的具体实现框架,最后指出了目前研究的难点和需要解决的关键问题。 In today' s highly dynamic and distributed environment, the traditional access control models can not meet the need of the information access. The next generation access control model usage control (UCON) model, was presented. The UCON model was first compared with the traditional access control models, and then the components and definition of the model were discussed. The 16 types of basic core models of UCON was formalized and the application instances were given, The implementation frame of UCON was also presented, Finally, the difficulties of research and the existing problems that must be solved were pointed out.
出处 《计算机应用研究》 CSCD 北大核心 2007年第9期121-123,126,共4页 Application Research of Computers
基金 国家自然科学基金(60371046) 广东海洋大学自然科学基金(0512135 0412128)
关键词 访问控制模型 使用控制 网络安全 access control model usage control network security
  • 相关文献

参考文献11

  • 1SANDHU R,COYNE E,FEINSTEIN H,et al.Role-based access control models[J].IEEE Computer,1996,29(2):38-47.
  • 2OSBORN S,SANDHU R,MUNAWER Q.Configuring role-based access control to enforce mandatory and discretionary access control policies[J].ACM Transactions on Information and Systems Secu-rity,2000,3(2):85-106.
  • 3赵宝献,秦小麟.数据库访问控制研究综述[J].计算机科学,2005,32(1):88-91. 被引量:17
  • 4PARK J,SANDHU R.Towards usage control models:beyond traditional access control[C]//Proc of the 7th ACM Symposium on Access Control Models and Technologies.Monterey,California:ACM Press,2002:57-64.
  • 5PARK J,SANDHU R.The UCON_ABC usage control model[J].ACM Transactions on Information and System Security,2004,7(1):128-174.
  • 6ZHANG Xin-wen,PARISI-PRESICCE F,SANDHU R,et al.Formal model and policy specification of usage control[J].ACM Transactions on Information and System Security,2005,8(4):351-387.
  • 7UNLU V,HESS T.The access-usage-control-matrix:a heuristic tool for omplementing a selected level of technical content protection[C]//Proc of the 7th IEEE International Conference on E-Commerce Technology.Berlin:IEEE Computer Society Press,2005:512-517.
  • 8BERTINO E,KHAN L R,SANDHU R,et al.Secure knowledge management:confidentiality,trust,and privacy[J].IEEE Transactions on Systems,Man and Cybernetics:Part A,2006,36(3):429-438.
  • 9ZHANG Xin-wen,CHEN Song-qing,SANDHU R.Enhancing data authenticity and integrity in P2P systems[J].IEEE Internet Computing,2005,9(6):42-49.
  • 10BERTINO E,SANDHU R.Database security-concepts,approaches,and challenges[J].IEEE Transactions on Dependable Secure Computing,2005,2(1):2-19.

二级参考文献27

  • 1Sandhu R,Jajodia S. Data and Database Security and Controls.Handbook of Information Security Management, Auerbach Publishers, 1993. 481~ 499
  • 2Ferraiolo D F,Cugini J, Kuhn D R. Role Based Access Control:Features and Motivations. In: Computer Security Applications Conf. 1995
  • 3Sandhu R. Relational Database Access Controls. Handbook of Informantion Secutrity Management(1992-95 Yearbook),Auerbach Publishers, 1994. 145 ~ 160
  • 4Sandhu R. Mandatory Controls For Database Integrity. In:Proc.of the IFIP WG11. 3 Workshop on Database Security,Monterey,Colifornia ,Sep. 1989
  • 5American National Standard for Information Technolology. Role Based Access Control. Information Technology Industry Council (ITI),Draft, Apr. 2003
  • 6Ferraiolo D F,et al. Proposed NIST Standard for Role-Based Access Control. ACM Transaction on Information and System Security,2001,4(3): 224~274
  • 7Graubart,Richard. On the Need for a Third Form of Access Control. In: Proc. of the 12th National Computing Security Conf.1989. 296~303
  • 8Sandhu R,Chen F. The Multilevel Relational (MLR) Data Model. ACM Transactions on Information and System Security, 1998,1(1):93~132
  • 9Park J,Sandhu R. Towards Usage Control Models: Beyond Traditional Access Control. SACMAT02, Monterey, Califomia, USA,ACM, 2002
  • 10Park J,Sandhu R. Originator Control in Usage Contrlol. In:3rd International Workshop on Policies for Distributed Systems and Networks(Policy02). June 2002

共引文献16

同被引文献29

引证文献3

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部