期刊文献+

新一代访问控制技术在web系统中的应用 被引量:1

The application and research of new access conrol method on web system
下载PDF
导出
摘要 为了对复杂的web系统资源的访问控制提供一个系统全面的访问控制方法,在对传统访问控制和现代访问控制方法进行分析的基础上提出了使用控制模型.通过UCON的基础模型分析了UCON模型在访问控制的连续性和可变属性两个方面的表现.两个具体的应用实例进一步证实了UCON模型在实际web系统访问控制上体现的优越性. With the wide application of the Internet, the studies of access control on web system has been one of the emphases of security. The Usage Control (UCON) model is put forward based on the analysis of traditional access control and modern access control to provide a systematic and comprehensive method for the complicated web system. Continuity and mutability are shown by the basic models of UCON. Two examples validate the advantage of UCON in solving the access control problems of web systems.
出处 《山东理工大学学报(自然科学版)》 CAS 2007年第6期49-52,共4页 Journal of Shandong University of Technology:Natural Science Edition
关键词 UCON WEB系统 访问控制 约束规则 形式化描述 UCON web system database access control constraint rules formal description
  • 相关文献

参考文献3

  • 1沈海波,洪帆.访问控制模型研究综述[J].计算机应用研究,2005,22(6):9-11. 被引量:87
  • 2Jachong Park, Ravi Sandhu, The UCONABC Usage Control Model[J]. ACM Transactions on Information and System Security(TISSEC), 2004, (10) : 1-47.
  • 3Sylvia Osborn, Ravi Sandhu, Qamar Munawer. Configuring Role-based Access Control to Enforce Mandatory and Discretionary Access Control Policies[J]. ACM Transactions on Information and Systems Seeurity( TISSEC), 2000,3 (2) : 85- 106.

二级参考文献11

  • 1L Snyder. Formal Models of Capability-based Protection Systems[ J].IEEE Transactions on Computers, 1981,30(3 ) :172-181.
  • 2R Sandhu, E Coyne, H Feinstein. Role-based Access Control Models[ J]. IEEE Computer, 1996,29 (6) :38-47.
  • 3D Ferraiolo, R Sandhu,et al. Proposed NIST Standard for Role-based Access Control [ J ]. ACM Transactions on Information and System Security(TISSEC) ,2001,4(3) :224-274.
  • 4R Thomas, R Sandhu. Task-Based Authorization Controls(TBAC) : A Family of Models for Active and Enterprise-Oriented Authorization Management[ C]. Lake Tahoe, CA: Proceedings of the 11th IFIP WG11.3 Conference on Database Security, 1997.
  • 5Gail-Joon Ahn, Myong Kang,et al. Injecting RBAC to Secure a Webbased Workflow System[ C]. ACM RBAC, 2000.
  • 6Sejong Oh, Seog Park. Task-role-based Access Control Model[ J ]. Information System, 2003, 28 : 533-562.
  • 7J Park, R Sandhu. Towards Usage Control Models: Beyond Traditional Access Control[ C]. Proceedings of the 7th ACM Symposium on Access Control Models and Technologies,2002.
  • 8R Sandhu, J Park. Usage Control : A Vision for Next Generation Access Control, MMM-ACNS [ EB/OL]. http://www. list. gmu. edu/conference_papers, htm, 2003.
  • 9Sonera Piazza Ltd MediaLab. Digital Rights Management. White Paper[ EB/OL]. http://www. medialab. sonera. fr/workspace./ DRM-WhitePaper. pdf, 2002.
  • 10徐锋,吕建.Web安全中的信任管理研究与进展[J].软件学报,2002,13(11):2057-2064. 被引量:113

共引文献86

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部