期刊文献+

浅谈基于角色的访问控制技术 被引量:6

Talking about the Technology of Role-based Access Control
下载PDF
导出
摘要 访问控制是一门重要的信息安全技术。介绍自主访问控制和强制访问控制,描述基于角色的访问控制技术原理和特点。 Access control is an important information security technology.Discretionary access control and mandatory access control are introduced.And the point is the technology of role-based access control.
出处 《计算机与数字工程》 2007年第10期145-148,共4页 Computer & Digital Engineering
基金 四川省教育厅重点科学科研项目基金项目(编号:2005A109) 西华师范大学校立科研项目(编号:05A009)资助
  • 相关文献

参考文献6

二级参考文献29

  • 1[1]Bell D, Padula L. Secure computer systems: unified exposition and MULTICS: [Report ESD-TR-75-306]. The MITRE Corporation, Bedford, Massachusetts, March 1976
  • 2[2]Clark D,Wilson D. A comparison of commercial and military computer security policies. In:proc. of the Symp. on Security and Privacy,IEEE Press, 1987. 184~194
  • 3[3]Sandhu R,Coyne E,Feinstein H,Youman C. Role-based access control models. IEEE Computer,1996,29(2)
  • 4[4]Ferraiolo D F,Sandhu R. Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and Systems Security, 2001,4(3)
  • 5[5]Ahn G,Sandhu R. Role-Based Authorization Constraints Specification. ACM Transactions on Information and System Security,2000,3(4)
  • 6U Leonhardt,J Magee. Security considerations for a distributed location service[J]. Journal of Network and Systems Man-agement, 1998,6( 1 ) : 51-70.
  • 7J H Sahzer, M D Schroeder. The protection of information in computer systems[J]. Proceedings of the IEEE, 1975,63(9): 1278-1308.
  • 8Personal Firewalls:What are they, how do they work? SANS Institute, 2000.
  • 9Gary N Stone, Bert Lundy, Geoffrey G Xie. Network Policy Languages: A survey and a new approach. IEEE Network, 2001.
  • 10G Denker, J Millen, Y Miyake. PKI and revoeation survey [J].Computer Science Laboratory, 2000.

共引文献109

同被引文献25

引证文献6

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部