期刊文献+

一个基于逻辑的存取控制模型

A Logic Based Access Control Model
下载PDF
导出
摘要 在任何一个安全系统中,存取控制都是一个极为重要的问题。本文提出一个基于逻辑程序设计的方法来管理非集中式的授权及其代理。在这个系统中,允许用户代理管理权限、授权或禁止其他用户使用某些存取权限。给出一组独立于论域的规则来实现代理正确性、解决冲突和沿着主体、客体及存取权限层次结构的授权传递,其基本思想是将这些一般规则与用户定义的一组与论域相关的特殊规则结合起来,以推导出系统中成立的所有授权。此外,还给出一些语义性质。 Access control is needed in any system where the resources are shared by different users. In this paper, we develop a logic based approach for decentralized authorization management in which users are delegated, granted or forbidden some access rights. A set of general logic rules are provided to handle the delegation correctness, conflict resolution and authorization propagation along the hierarchies of subjects, objects and access rights. By combining these general rules with application-specific rules defined by users, we can derive the authorizations holding in the system, In addition, some semantic properties are further investigated.
出处 《计算机科学》 CSCD 北大核心 2007年第10期152-154,172,共4页 Computer Science
基金 本文得到国家863数据库重大专项课题<基于"关系+对象+代理"模型的对象管理技术研究>(2002AA423450)资助
关键词 逻辑规则 控制模型 授权 代理 Logic rules, Control model, Authorization,Delegation
  • 相关文献

参考文献7

  • 1Abadi M, Burrows M, Lampson B, et al. A calculus for access control in distributed systems. ACM Trans on programming languages and systems, 1993, 15(4) : 706-734
  • 2Bertino E,buccafurri F,Ferrari E, et al. A logical framework for reasoning on data access control policies. In: Proceedings of the 12th IEEE Computer Society Foundations Workshop, IEEE Computer Society Press, Los Alamitos, 1999. 175-189
  • 3Crampton J,Loizou G,O'Shea G. A logic of access control. The Computer Journal, 2001,44 : 54- 66
  • 4Gelfond M, Lifschitz V. Classical negation in logic programs and disjunctive databases. New Generation Computing, 1991,9 : 365 -385
  • 5Jajodia S, Samarati P, Subrahmanian V S. A logical language for expressing authorizations. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1997. 31-42
  • 6Ruan C, Varadharajan V. Resolving conflicts in authorization delegations. In: Proceedings of the 7th Australasian Conference on Information Security and Privacy, 2002
  • 7Woo T, Lam S. Authorization in distributed systems: a formal approach. In, Proceedings of IEEE on Research in Security and Privacy, 1992. 33-50

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部