期刊文献+

使用控制模型在RBAC中的应用

Application of Usage Control Model in RBAC
下载PDF
导出
摘要 使用控制模型是最近提出的新型访问控制模型,它系统全面地定义了现代访问控制模型的范畴和框架。首先对使用控制核心模型的结构和授权策略进行介绍与分析,在此基础上,应用到RBAC中实现了其策略,并给出了使用控制模型在RBAC中应用的具体实例。 Usage control model is a new access control model proposed nearly,it defines the scope and framework of modern access control model systematically and comprehensively.The framework and authorization strategy of usage control core model is introduced and analyzed at first by the author,used to implement the RBAC policy,and finally an application example is presented.
出处 《计算机与数字工程》 2008年第1期45-47,51,共4页 Computer & Digital Engineering
基金 国家自然科学基金项目(60673010) 湖北省自然科学基金计划项目(2006ABC011)资助
关键词 使用控制模型 RBAC 授权 usage control model,role-based access control,authorization
  • 相关文献

参考文献4

  • 1俞银燕,汤帜.数字版权保护技术研究综述[J].计算机学报,2005,28(12):1957-1968. 被引量:141
  • 2Jaehong Park, Ravi Sandhu. The UCONABc Usage Control Model[J]. ACM Transactions on Information and System Security (TISSEC), 2004, (10):1 -47
  • 3Jaehong Park, Ravi Sandhu. Towards Usage Control Models : Beyond Traditional Access Control [ A ]. SACMAT' 02 [ C]. Monterey, California, USA : ACM ,2002.57 - 64.
  • 4Ravi Sandu , Edward Coyne. Role- based Access Control Models[ J ]. IEEE Computer,1996, 29(2) :38 -47

二级参考文献64

  • 1俞银燕,汤帜.一种具有硬件适应性的数字内容版权保护机制[J].北京大学学报(自然科学版),2005,41(5):800-808. 被引量:13
  • 2Rosenblatt W.,Trippe W.,Mooney S.Digital Rights Management:Business and Technology.New York:M & T Books,2002
  • 3Garnett N.Digital rights management,copyright,and napster.ACM SIGecom Exchanges,2001,2(2):1~5
  • 4Davis R.The digital dilemma.Communications of the ACM,2001,44(2):77~83
  • 5Biddle P.,England P.,Peinado M.,Willman B.The darknet and the future of content distribution.In:Feigenbaum J.ed.Digital Rights Management,Lecture Notes in Computer Science 2696,Berlin:Springer-Verlag,2003,155 ~ 176
  • 6Sibert O.,Bernstein D.,Wie D.V.The DigiBox:A self-protecting container for information commerce.In:Proceedings of the 1st USENIX Workshop on Electronic Commerce,New York,1995,171~183
  • 7Konstantas D.,Morin J.H.Trading digital intangible goods:The rules of the game.In:Proceedings of the 33rd Hawaii International Conference on System Sciences,IEEE Computer Society,Maui,Hawaii,2000,3362~3371
  • 8Chong C.N.,Buuren R.,Hartel P.H.,Kleinhuis G.Security attributes based digital rights management.In:Boavida F.,Monteiro E.,Orvalho J.eds.Protocols and Systems for In teractive Distributed Multimedia,Lecture Notes in Compute Science 2515,Berlin:Springer-Verlag,2002,339~352
  • 9Yau J.C.K.,Hui L.C.K.etal.A digital rights managemen system for e-content.University of Hong Kong,Hong Kong HKU CSIS Technical Reports TR-2004-03,2004
  • 10Rump N.Definitions,aspects,and overview.In:Becker E.et al.eds.Digital Rights Management:Technological,Economic,Legal and Political Aspects,Lecture Notes in Computer Science 2770,Berlin:Springer-Verlag,2003,3~6

共引文献140

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部