期刊文献+

资源空间模型中的访问控制技术

下载PDF
导出
摘要 介绍了资源空间模型的概念,就资源空间模型中的访问控制技术进行了分析。提出对资源空间模型中资源访问权限进行定义和角色划分的方法,并针对角色映射会话提出了基于正交轴的用户访问控制列表。
作者 陶洁 朱源
出处 《湘潭师范学院学报(自然科学版)》 2007年第4期62-65,共4页 Journal of Xiangtan Normal University (Natural Science Edition)
  • 相关文献

参考文献11

  • 1Zhnge H. A Knowledge grid model and platform for global knowledge sharing[J]. Expert Systems with Application, 2002, (22) :313 - 320.
  • 2Zhuge H. Resource Space Model, Its Design Method and Applications[J]. Journal of Systems and Software, 2004,72(1):71 -84.
  • 3Zhuge H, Xing Y. Integrity Theroy for Resource Space Model and Its Application. Keynote at WAIM2005, LNCS 3739,2005.
  • 4Spyros T Halkidis. Alexander Chatzigeorgiou, George Stephanides, A qualitative analysis of software security patterns [ J ]. Computer and Security, 2006,25 : 379 - 392.
  • 5訾小超,张绍莲,茅兵,谢立.访问控制技术的研究和进展[J].计算机科学,2001,28(7):26-28. 被引量:15
  • 6刘宏月,范九伦,马建峰.访问控制技术研究进展[J].小型微型计算机系统,2004,25(1):56-59. 被引量:76
  • 7赵宝献,秦小麟.数据库访问控制研究综述[J].计算机科学,2005,32(1):88-91. 被引量:16
  • 8SANDHU R S, COYNE E J, FEINSITAN H L. Role - based access control models[J]. IEEE computer, 1996,29(2) :38 - 47.
  • 9Sandhu R, Bhamidipati V, Munawer Q. The ARBAC97 Model for Role- Based Administration of Roles[J]. ACM Transation on Info and System Security, 1999,2(1):105- 135.
  • 10Ferraiolo D F. Proposed NIST Standard for Role- Based Access Control[J]. ACM Transaction on Information and System Security, 2001,4(3) :224- 274.

二级参考文献32

  • 1KevinLoney 李晓军 等.Oracle8数据库管理员手册[M].北京:机械工业出版社,2000..
  • 2Sandhu R,Jajodia S. Data and Database Security and Controls.Handbook of Information Security Management, Auerbach Publishers, 1993. 481~ 499
  • 3Ferraiolo D F,Cugini J, Kuhn D R. Role Based Access Control:Features and Motivations. In: Computer Security Applications Conf. 1995
  • 4Sandhu R. Relational Database Access Controls. Handbook of Informantion Secutrity Management(1992-95 Yearbook),Auerbach Publishers, 1994. 145 ~ 160
  • 5Sandhu R. Mandatory Controls For Database Integrity. In:Proc.of the IFIP WG11. 3 Workshop on Database Security,Monterey,Colifornia ,Sep. 1989
  • 6American National Standard for Information Technolology. Role Based Access Control. Information Technology Industry Council (ITI),Draft, Apr. 2003
  • 7Ferraiolo D F,et al. Proposed NIST Standard for Role-Based Access Control. ACM Transaction on Information and System Security,2001,4(3): 224~274
  • 8Graubart,Richard. On the Need for a Third Form of Access Control. In: Proc. of the 12th National Computing Security Conf.1989. 296~303
  • 9Sandhu R,Chen F. The Multilevel Relational (MLR) Data Model. ACM Transactions on Information and System Security, 1998,1(1):93~132
  • 10Park J,Sandhu R. Towards Usage Control Models: Beyond Traditional Access Control. SACMAT02, Monterey, Califomia, USA,ACM, 2002

共引文献115

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部