期刊文献+

使用控制策略的Petri网描述 被引量:2

Authorization specification of usage control with Petri net
下载PDF
导出
摘要 使用控制是最有希望的下一代数字资源使用保护技术,Petri网能够描述使用控制模型的分布、并发、同步等特征,是表达和研究使用控制模型的有效技术。定义了授权控制模型的访问策略,然后采用Petri网进行了表达,证明了Petri网表达授权访问策略的正确性,最后通过示例说明了Petri网表示的表达能力。 Usage control is one of the next generation technologies that protect the digital resources.Petri net can specify distributions,concurrencies and synchronizations of usage control and is the effective technology for describing and analyzing usage control model.This paper defines the polices of authorization control model and expresses them in Petri nets.It is verified that the representations are soundness and completeness.At last,the author shows the flexibility and expressive capability of based-Petri UCONA by an example.
作者 李沛武
出处 《计算机工程与应用》 CSCD 北大核心 2008年第2期60-62,共3页 Computer Engineering and Applications
基金 江西省自然科学基金( the Natural Science Foundation of Jiangxi Province of China under Grant No.0511062) 江西省教育厅科技计划项目( No.赣教技字[2005]240) 。
关键词 使用控制 PETRI网 访问策略 合理性 完整性 usage control Petri net access policies soundness completeness
  • 相关文献

参考文献8

  • 1Sandhu R,Park J.Usage control:a vision for next generation access control[C]//The 2nd International Workshop on Mathematical Methods,Models and Architectures for Computer Networks Security,2003:17-31.
  • 2Park J,Sandhu R.Towards usage control models:beyond traditional access control[C]//Proceedings of 7th ACM Symposium on Access Control Models and Technologies,2002:57-64.
  • 3Park J,Sandhu R.The UCONABC usage control model[J].ACM Transaction on Information and Systems Security,2004,7(1):128-174.
  • 4Park J,Sandhu R.Towards an engineering framework for usage control and digital right management[C]//Proceedings of 7th ACM Symposium on Access Control Models,2002:15-32.
  • 5Zhang Xin-wen,Park J,Sandhu R.A logical specification for usage control[C]//Proceedings of 9th ACM Symposium on Access Control Models and Technologies,2004:67-75.
  • 6Zhang Xin-wen,Parisi-Presicce F,Sandhu R.Formal model and policy specification of usage control[J].ACM Transaction on Information and Systems Security,2004,8(4):351-387.
  • 7Jensen K.An introduction to the theoretical aspects of colored petri nets[M].[S.l.]:Springer-Verlag,1994.
  • 8Sandhu R S,Bhamidipati V.The URA97 model for role-based administration of user-role assignment[M].Lin T Y,Qian Xiao-lei.Database Security Ⅺ:Status and Prospects,North-Holland,1997.

同被引文献18

  • 1彭凌西,陈月峰,彭银桥.新型的使用访问控制模型[J].信息技术,2005,29(6):27-29. 被引量:3
  • 2Park J. Sandhu R. Towards usage control models: beyond traditional access control[ C]//Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002 : 57 - 64.
  • 3Park J.Sandhu R.The UCONABC usage control model[J] .ACM Transactions on Information and Systems Security,2004,7(1):128- 174.
  • 4Sandhu R. Park J. Usage control:a vision for next generation access control[ C]//Proceedings of The 2rid International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security ,2003 : 17- 31.
  • 5Zhang Xinwen, Park J, Sandhu R. A logical specification for usage control[C]//Proceedings of 9th ACM Symposium on Access Control Models and Technologies, 2004 : 67 - 75.
  • 6Park J. Usage control :a unified framework for next generation access control[D]. Doctor dissertation,USA:George Mason University ,2003.
  • 7王俊恒,宋顺林.基于Sagas模型的改进事务模型[J].微计算机信息,2007,23(27):224-225. 被引量:4
  • 8Bandara A,Lobo J,Calo S,et al.Toward a formal char- acterization of policy specification analysis[C]//Annual Conference of ITA (ACITA) , University of Maryland, USA, 2007.
  • 9Bandara A, Lupu E, Russo A.Using event calculus to for- malise policy specification and analysis[C]//POLICY'03: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks.Washing-ton DC,USA:IEEE Computer Society,2003.
  • 10Katt B, Zhang X, Breu R, et al.A general obligation model and continuity enhanced policy enforcement engine for usage control[C]//Ray I, Li Ninghui.SACMAT' 08 : Proceed- ings of the 13th ACM Symposium on Access Control Models and Technologies,2008.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部