期刊文献+

多层安全代理的集成访问控制系统架构研究 被引量:4

RESEARCH ON INTEGRATED ACCESS CONTROL SYSTEM BASED ON MULTILAYER SECURITY AGENT
下载PDF
导出
摘要 考虑到复杂的网络安全需要,将代理技术与其他安全机制相结合,通过运用多层安全代理和集成访问控制技术,架构了一个基于多层安全代理的集成访问控制模型。在这种架构下,实现了基于角色访问控制开发的校园网认证系统。该模型具有多层安全代理能够自适应调度、灵活的访问规则和智能的网络安全防范等主要特点。 Considering the demand of the complex network security,the agent technology and other security systems are combined. An integrated access control model based on multilayer security agent is proposed. Then a campus certification system using role based access control is designed This model based on multilayer agent has the characteristics of self-adaptive scheduling,flexible rule of access and intelligent protection of network security.
作者 陆旭 勒中坚
出处 《计算机应用与软件》 CSCD 北大核心 2007年第12期218-221,共4页 Computer Applications and Software
关键词 网络安全 安全代理 访问控制 基于角色访问控制 Network security Security agent Access control Role based access control
  • 相关文献

参考文献9

  • 1Qing Sihan,Liu Wenqing,Liu Haifeng. The Introduetion to Securily of Operalion System[M]. Beijing:The Science Press,2003.
  • 2Sandhu R, Coyne E, Feinstein H, et al. Role-based Access Control Models[J]. IEEE Computer, 1996,29(2 ) :38 - 47.
  • 3Sandhu S. The ARBAC97 Model for Role-Based Administration of Roles : Preliminary Description and Outline[ C ]. Proceedings of the second ACM workshop on Role-based access control. November, 1997:41 -50.
  • 4Ahn, GJ. The RCI2000 language for specifying role-based authorization constraints [ Ph. D. Thesis ]. Fairfax,VA : George Mason University, 1999.
  • 5Ahn GJ, SANDHU R S. Role-Based Authorization Constraints Specification [ J ]. ACM Trans on Information and System Security, 2000,3 (4) :207 -226.
  • 6Ferraiolo D, Sandhu S, Gavrila S, et al. Proposed NIST Standard for Role-Bascd Access Conlrol[ J ]. ACM Trans on Information and System Security ,2001,4( 3 ) :224 - 274.
  • 7Sandhu R S, Ferraiolo D,Kuhn R. The NIST Model for Role-based Access Control:Towards a Unified Standard[ C ]. Proceedings of thc Fifth ACM Workshop on Role Based Access Control, Berlin, Germany : ACM, 2000:47 - 63.
  • 8Perlman. An Overview of PKI Trust Model[A]. IEEE network, 1999,13 (6) :38 - 43,Institute of Electrical and Electronics Engineers, 1999.
  • 9Guan Zhensbeng. Public Key Infrastructure and Certificate Authority [ M ]. Beijing: Publish House of Electrics Industry, 2002.

同被引文献27

引证文献4

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部